maxking / linux-vulnerabilities-10-years
My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.
☆155Updated 6 years ago
Alternatives and similar repositories for linux-vulnerabilities-10-years:
Users that are interested in linux-vulnerabilities-10-years are comparing it to the libraries listed below
- Linux kernel exploitation experiments☆198Updated last week
- ☆84Updated 8 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆334Updated 2 years ago
- Function redirection via ELF tricks.☆157Updated 9 years ago
- Radare 2 wiki☆91Updated 4 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆147Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆222Updated 4 years ago
- A fuzzing framework for network servers☆118Updated 6 years ago
- Notes on various topics I'm interested in☆158Updated 9 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆246Updated 5 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- VirtualBox 3D exploits & PoCs☆161Updated 6 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆193Updated 4 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Updated 7 years ago
- ☆63Updated 5 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆149Updated 6 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- ☆249Updated 5 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆167Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- A linux system call fuzzer using TriforceAFL☆174Updated last year
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆298Updated 2 years ago
- LKRG bypass methods☆71Updated 5 years ago