nu11secur1ty / Kernel-and-Types-of-kernels
Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.html
☆34Updated last year
Alternatives and similar repositories for Kernel-and-Types-of-kernels:
Users that are interested in Kernel-and-Types-of-kernels are comparing it to the libraries listed below
- ☆11Updated 4 years ago
- ☆12Updated 7 years ago
- A Unix rootkit☆16Updated 4 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆34Updated 4 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆36Updated 11 years ago
- (Linux Kernel) Stack Monitoring Tool☆42Updated 2 years ago
- Booting Process Explained☆127Updated last year
- ¯\_(ツ)_/¯☆29Updated 5 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆26Updated 2 years ago
- CMU's attack lab☆13Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆50Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 4 years ago
- ☆83Updated last year
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- ☆14Updated 8 years ago
- This repository has everything I have learnt so far while reading the book Practical Malware Analysis☆30Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆26Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- POC for cve-2019-1458☆21Updated 4 years ago
- Source code of https://blahcat.github.io☆13Updated 6 months ago