nick0ve / how-to-bypass-aslr-on-linux-x86_64View external linksLinks
ASLR bypass without infoleak
☆167Nov 2, 2021Updated 4 years ago
Alternatives and similar repositories for how-to-bypass-aslr-on-linux-x86_64
Users that are interested in how-to-bypass-aslr-on-linux-x86_64 are comparing it to the libraries listed below
Sorting:
- ☆189Feb 8, 2025Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆188Dec 25, 2020Updated 5 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆469Apr 13, 2024Updated last year
- Code Coverage Exploration Plugin for Ghidra☆374Jul 19, 2024Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,279Jan 29, 2026Updated 2 weeks ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Feb 12, 2025Updated last year
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 4 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆771Updated this week
- eBPF hacks☆196Dec 12, 2024Updated last year
- Binary exploitation by confusing the unwinder☆68Mar 9, 2023Updated 2 years ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- LKRG bypass methods☆73Jan 10, 2020Updated 6 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Nov 15, 2025Updated 3 months ago
- ☆16Oct 18, 2024Updated last year
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- A collection of links related to VMware escape exploits☆1,488Sep 4, 2024Updated last year
- collection of V8 design documents☆79Jan 4, 2026Updated last month
- Operating System Design Review: A systematic analysis of modern systems architecture☆337Jan 11, 2026Updated last month
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- Python Command-Line Ghidra Binary Diffing Engine☆738Sep 25, 2025Updated 4 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆922May 20, 2024Updated last year
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆13Dec 14, 2021Updated 4 years ago
- ☆16Oct 15, 2024Updated last year
- ☆35Oct 25, 2021Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆216May 9, 2024Updated last year
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Nov 23, 2023Updated 2 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- ☆330Jun 20, 2024Updated last year