ASLR bypass without infoleak
☆168Nov 2, 2021Updated 4 years ago
Alternatives and similar repositories for how-to-bypass-aslr-on-linux-x86_64
Users that are interested in how-to-bypass-aslr-on-linux-x86_64 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆190Feb 8, 2025Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆189Dec 25, 2020Updated 5 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- Code Coverage Exploration Plugin for Ghidra☆379Jul 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆470Apr 13, 2024Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,286Jan 29, 2026Updated 2 months ago
- qemu vulnerablity.☆56May 25, 2021Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- ☆13Dec 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A plugin to introduce interactive symbols into your debugger from your decompiler☆786Feb 18, 2026Updated last month
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- IDB parser☆26Nov 24, 2025Updated 4 months ago
- collection of V8 design documents☆81Jan 4, 2026Updated 2 months ago
- ☆19Jan 31, 2023Updated 3 years ago
- Operating System Design Review: A systematic analysis of modern systems architecture☆340Jan 11, 2026Updated 2 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Binary exploitation by confusing the unwinder☆68Mar 9, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆91Nov 23, 2023Updated 2 years ago
- Recursive MMIO VM Escape PoC☆171May 13, 2022Updated 3 years ago
- Rerousces related to time-travel debugging (TTD)☆36Jan 6, 2026Updated 2 months ago
- ☆16Oct 18, 2024Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆748Sep 25, 2025Updated 6 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆922May 20, 2024Updated last year
- helps visualize heap operations for pwn and debugging☆330Jan 27, 2023Updated 3 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆215May 9, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- eBPF hacks☆198Dec 12, 2024Updated last year
- ☆21Sep 25, 2023Updated 2 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆213Jul 2, 2020Updated 5 years ago
- ☆330Jun 20, 2024Updated last year
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 4 years ago
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- ☆287Apr 23, 2020Updated 5 years ago