nu11secur1ty / Kernel-and-Types-of-kernelsLinks
Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.html
☆35Updated 2 years ago
Alternatives and similar repositories for Kernel-and-Types-of-kernels
Users that are interested in Kernel-and-Types-of-kernels are comparing it to the libraries listed below
Sorting:
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Updated 12 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆45Updated 9 years ago
- System programming & Algorithm ― Linux programming☆14Updated 7 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆38Updated 6 years ago
- Snippets from ARM assembly tutorials☆114Updated 8 years ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- Kernel Hacking study materials collection☆109Updated 9 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆16Updated 8 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- A collection of some interesting network security projects☆62Updated 7 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- ☆12Updated 8 years ago
- ☆24Updated 5 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆42Updated 7 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- A Unix rootkit☆16Updated 5 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Updated 10 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 4 years ago
- A large group of assembly language programs & samples ..with different topics and levels..from Ascci to Stack - assembly programming.☆16Updated 5 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆36Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Understanding Linux Kernel Vulnerability☆23Updated 7 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Ghidra plugin to communicate with radare2☆65Updated this week
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago