nu11secur1ty / Kernel-and-Types-of-kernelsLinks
Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.html
☆35Updated 2 years ago
Alternatives and similar repositories for Kernel-and-Types-of-kernels
Users that are interested in Kernel-and-Types-of-kernels are comparing it to the libraries listed below
Sorting:
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Updated 12 years ago
- A large group of assembly language programs & samples ..with different topics and levels..from Ascci to Stack - assembly programming.☆16Updated 5 years ago
- System programming & Algorithm ― Linux programming☆14Updated 7 years ago
- Snippets from ARM assembly tutorials☆114Updated 8 years ago
- CMU's attack lab☆13Updated last year
- ☆12Updated 8 years ago
- Kernel Hacking study materials collection☆110Updated 9 years ago
- bunch of random stuff☆21Updated 5 years ago
- Just another (unfinished) kernel from scratch...☆47Updated 3 years ago
- (Linux Kernel) Stack Monitoring Tool☆46Updated 3 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆16Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Random number rootkit for the Linux kernel☆28Updated 9 years ago
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 7 years ago
- Repository for officially supported Binary Ninja plugins☆51Updated 2 weeks ago
- Assembly language files and Shellcode☆34Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- Source code of https://blahcat.github.io☆13Updated last year
- security related events, tools, tutorials, cheatsheets, and more.☆11Updated 9 years ago
- MOVING TO: https://cirosantilli.com/linux-kernel-module-cheat/#algorithms see README. Algorithm tutorials and simple multi-language imple…☆80Updated 5 years ago
- ¯\_(ツ)_/¯☆30Updated 5 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- An emulator/debugger/disassembler I made for 8080☆16Updated 6 years ago
- Ghidra plugin to communicate with radare2☆59Updated this week
- ☆16Updated 3 years ago