nu11secur1ty / Kernel-and-Types-of-kernelsLinks
Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.html
☆35Updated 2 years ago
Alternatives and similar repositories for Kernel-and-Types-of-kernels
Users that are interested in Kernel-and-Types-of-kernels are comparing it to the libraries listed below
Sorting:
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Updated 12 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆44Updated 8 years ago
- Kernel Hacking study materials collection☆110Updated 9 years ago
- System programming & Algorithm ― Linux programming☆14Updated 7 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆16Updated 8 years ago
- Snippets from ARM assembly tutorials☆114Updated 8 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- ☆12Updated 8 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Just another (unfinished) kernel from scratch...☆47Updated 3 years ago
- Source code of https://blahcat.github.io☆13Updated 3 weeks ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Rootkit Arsenal 2nd Source Code☆14Updated 12 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 4 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- A collection of some interesting network security projects☆61Updated 7 years ago
- Simplified Assembly Loader - a small tool to run (headerless) machine code.☆45Updated 8 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- CMU's attack lab☆13Updated 2 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆77Updated 5 years ago
- bunch of random stuff☆21Updated 5 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Ghidra plugin to communicate with radare2☆60Updated last week
- 0-ring rootkit revealer for Linux☆28Updated 6 years ago