nu11secur1ty / Kernel-and-Types-of-kernels
Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.html
☆34Updated last year
Alternatives and similar repositories for Kernel-and-Types-of-kernels:
Users that are interested in Kernel-and-Types-of-kernels are comparing it to the libraries listed below
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 4 years ago
- Lazily wraps various Linux system auditing tools☆17Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆41Updated 6 years ago
- ☆12Updated 7 years ago
- An emulator/debugger/disassembler I made for 8080☆16Updated 6 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 4 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆16Updated 8 years ago
- A Unix rootkit☆16Updated 4 years ago
- ☆11Updated 4 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Just another (unfinished) kernel from scratch...☆45Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 8 years ago
- scrapped ideas and garbage code☆13Updated 3 years ago
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆40Updated 7 years ago
- Source code of https://blahcat.github.io☆13Updated 7 months ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Understanding Linux Kernel Vulnerability☆21Updated 7 years ago
- Rex library for various exploitation helpers☆22Updated last week
- pure Python binary analysis framework☆22Updated 6 years ago
- ☆23Updated 4 years ago
- Modern Binary Exploitation write-ups.☆4Updated 4 years ago
- Copy of the contents at phrack.com☆38Updated 5 months ago
- Dockerized setup for quick pwning☆23Updated 3 years ago
- ☆19Updated 8 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago