Kernel exploits and writeups
☆17May 11, 2022Updated 3 years ago
Alternatives and similar repositories for kernel-exploits
Users that are interested in kernel-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2022-24122 Proof of Concept☆13Mar 15, 2022Updated 4 years ago
- ☆10Feb 2, 2021Updated 5 years ago
- ☆27May 25, 2022Updated 3 years ago
- 🦀🦊 Snappy (Firefox morgue cache format) files de-compressor, works even if they're corrupted☆30Apr 29, 2025Updated 10 months ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Tiniest ELF (Executable and Linkable Format) executable☆14Aug 27, 2018Updated 7 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- pwndbg configuration to use tmux panes☆14Jan 15, 2025Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆51Jul 3, 2022Updated 3 years ago
- A crawler for kernel releases distributed by the major Linux distributions.☆13Oct 18, 2024Updated last year
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- All the project is about to get Armbian (Tested on version Jammy-current) on Odroid HC4 without erase petitboot partition on your board.☆11Feb 11, 2024Updated 2 years ago
- An index of blocklists and a tool to extract CIDRs to use in firewalls and network appliances.☆12Aug 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Ansible playbooks to provision firecracker VMs and run Falco kernel tests☆14Mar 2, 2026Updated 3 weeks ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- A Telegram bot that can be used to stamp the card on that horrible platform called Zucchetti☆13Mar 29, 2022Updated 3 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- Personal scripts for binary ninja☆26Jul 24, 2019Updated 6 years ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- Scriptable green pass / Digital Covid Certificate verifier.☆50Jun 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆15Mar 24, 2016Updated 10 years ago
- An open source framework to easily build and deploy eBPF/XDP network monitoring probes and clusters in order to perform Service Programs …☆25Jun 1, 2022Updated 3 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- ☆172Jan 5, 2025Updated last year
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆48Jan 31, 2020Updated 6 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- ☆14Mar 18, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ⚫📁 Dotfiles☆22Aug 31, 2021Updated 4 years ago
- Created while playing https://sourcery.pwnadventure.com☆26Nov 16, 2018Updated 7 years ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- Unsupervised coverage-guided btrfs fuzzer☆15Nov 13, 2020Updated 5 years ago
- 🐉 Export ghidra decompiled code to dwarf sections inside ELF binary☆221Nov 3, 2023Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- ☆13Aug 2, 2020Updated 5 years ago