☆103Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for kernel-exploitation
Users that are interested in kernel-exploitation are comparing it to the libraries listed below
Sorting:
- ☆43Dec 2, 2021Updated 4 years ago
- Exploit for CVE-2022-27666☆205Mar 28, 2022Updated 3 years ago
- ☆189Feb 8, 2025Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Dec 1, 2022Updated 3 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆200Jul 27, 2022Updated 3 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆761Jan 27, 2026Updated last month
- ☆25Jul 19, 2024Updated last year
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆120Jan 9, 2023Updated 3 years ago
- ☆176May 2, 2019Updated 6 years ago
- Some pwn challenges selected for training and education.☆388Jun 26, 2023Updated 2 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- CVE-2022-0185 POC and Docker and Analysis write up☆39May 24, 2022Updated 3 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- ☆30Sep 6, 2022Updated 3 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Dec 28, 2021Updated 4 years ago
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆210Jan 26, 2022Updated 4 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆214Sep 17, 2021Updated 4 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- ☆26Dec 17, 2021Updated 4 years ago
- kernel-pwn and writeup collection☆705Oct 2, 2023Updated 2 years ago
- Slides from various conference talks☆37May 30, 2023Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 2 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆62Feb 22, 2017Updated 9 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago