LKRG bypass methods
☆74Jan 10, 2020Updated 6 years ago
Alternatives and similar repositories for lkrg-bypass
Users that are interested in lkrg-bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jul 31, 2020Updated 5 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆470Apr 13, 2024Updated last year
- ugly code to check linux kernel memory and dump some internal structures☆48Nov 20, 2024Updated last year
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- out-of-tree kernel {module, exploit} development tool☆230Dec 2, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploit generator for Intel ME 11 buffer overflow☆33Nov 14, 2019Updated 6 years ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆91Nov 23, 2023Updated 2 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- A hacky tool for analysing linux kernel commits☆39Feb 7, 2023Updated 3 years ago
- Linux Kernel Runtime Guard☆583Mar 17, 2026Updated last week
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆103Nov 20, 2022Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆201Mar 14, 2024Updated 2 years ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- Vault Exploit Defense☆127Sep 7, 2024Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Emulating Exynos 4210 BootROM in QEMU☆77Feb 7, 2020Updated 6 years ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- ☆51Mar 9, 2022Updated 4 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- ☆37May 5, 2021Updated 4 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Dec 11, 2019Updated 6 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hacking the Linux kernel☆15Jun 17, 2023Updated 2 years ago
- ☆73Nov 19, 2022Updated 3 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- ☆448Oct 3, 2024Updated last year
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆97Aug 22, 2018Updated 7 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago