milabs / lkrg-bypass
LKRG bypass methods
☆69Updated 4 years ago
Related projects: ⓘ
- A binary hardening system☆96Updated 11 months ago
- Disabling kernel lockdown on Ubuntu without physical access☆77Updated last year
- ☆59Updated last week
- ☆94Updated last year
- Fork Free Fail Repeat☆46Updated 3 years ago
- ☆27Updated 5 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆24Updated 4 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆106Updated 4 years ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆153Updated 2 years ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Updated 3 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago
- A repository teaching bss/data segment exploitation techniques.☆12Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆110Updated 6 years ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆44Updated 2 years ago
- (Linux Kernel) Stack Monitoring Tool☆41Updated 2 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆141Updated last year
- Alcatraz project for Black Hat USA 2021☆76Updated 3 years ago
- A library for patching ELFs☆52Updated 3 years ago
- tool for multi-execution jump coverage introspection☆62Updated last year
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆56Updated 9 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆58Updated last year
- Use Ghidra Structs in Python☆28Updated 3 years ago
- Automated recovery of Linux kernel build configurations☆23Updated 2 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆52Updated 4 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆24Updated last year
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆164Updated 3 years ago
- ☆63Updated 5 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆98Updated 2 years ago
- ☆36Updated this week