nu11secur1ty / Kernel-and-Types-of-kernelsLinks
Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.html
☆34Updated 2 years ago
Alternatives and similar repositories for Kernel-and-Types-of-kernels
Users that are interested in Kernel-and-Types-of-kernels are comparing it to the libraries listed below
Sorting:
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 5 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆38Updated 12 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- Kernel Hacking study materials collection☆110Updated 9 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆16Updated 8 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆36Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 7 years ago
- Just another (unfinished) kernel from scratch...☆46Updated 3 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Source code of https://blahcat.github.io☆13Updated last year
- ☆11Updated 4 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Updated 5 years ago
- ¯\_(ツ)_/¯☆30Updated 5 years ago
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- ☆13Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆35Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- A wrapper for capstone for bearparser☆14Updated 2 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago