nu11secur1ty / Kernel-and-Types-of-kernelsLinks
Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.html
☆35Updated 2 years ago
Alternatives and similar repositories for Kernel-and-Types-of-kernels
Users that are interested in Kernel-and-Types-of-kernels are comparing it to the libraries listed below
Sorting:
- Kernel Hacking study materials collection☆109Updated 9 years ago
 - Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
 - Snippets from ARM assembly tutorials☆114Updated 8 years ago
 - https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
 - ☆12Updated 4 years ago
 - 0-ring rootkit revealer for Linux☆28Updated 6 years ago
 - Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
 - A gentle introduction to binary exploitation☆41Updated 5 years ago
 - ☆12Updated 8 years ago
 - ¯\_(ツ)_/¯☆30Updated 5 years ago
 - SSD Challenges☆48Updated 3 years ago
 - Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
 - Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Updated 12 years ago
 - Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆16Updated 8 years ago
 - Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
 - Linux kernel internals' notes☆20Updated last year
 - Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆44Updated 9 years ago
 - Source code of https://blahcat.github.io☆13Updated 3 weeks ago
 - Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆37Updated 6 years ago
 - Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
 - An emulator/debugger/disassembler I made for 8080☆16Updated 6 years ago
 - Understanding Linux Kernel Vulnerability☆23Updated 7 years ago
 - My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
 - Vagrant setup for building a machine for CTF/exploit development☆22Updated 6 years ago
 - Copy of the contents at phrack.com☆40Updated 7 months ago
 - Experiments on C/C++ Exploits☆21Updated 5 years ago
 - Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
 - PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
 - Cryptographic Dataset Generation & Modelling Framework☆39Updated 5 years ago
 - Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago