☆103Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for kernel-exploitation
Users that are interested in kernel-exploitation are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2022-27666☆205Mar 28, 2022Updated 3 years ago
- ☆228Dec 9, 2020Updated 5 years ago
- ☆189Feb 8, 2025Updated last year
- ☆14Sep 26, 2021Updated 4 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- Slides from various conference talks☆37May 30, 2023Updated 2 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆757Jan 27, 2026Updated last month
- ☆46Jan 23, 2022Updated 4 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Jul 27, 2022Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Dec 1, 2022Updated 3 years ago
- Some pwn challenges selected for training and education.☆388Jun 26, 2023Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆119Jan 9, 2023Updated 3 years ago
- ☆25Jul 19, 2024Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- kernel-pwn and writeup collection☆700Oct 2, 2023Updated 2 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- ☆177Jun 18, 2023Updated 2 years ago
- Automated recovery of Linux kernel build configurations☆25Jan 14, 2022Updated 4 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- ☆176May 2, 2019Updated 6 years ago
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Dec 28, 2021Updated 4 years ago
- ☆11Oct 30, 2024Updated last year
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆97Mar 29, 2023Updated 2 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆211Jan 26, 2022Updated 4 years ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- CVE-2022-0185☆378Apr 25, 2022Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆85Jan 20, 2025Updated last year
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆215Sep 17, 2021Updated 4 years ago
- ☆24Dec 11, 2022Updated 3 years ago