rexguowork / phantom-attack
POC for Phantom Attack
☆82Updated 2 years ago
Alternatives and similar repositories for phantom-attack:
Users that are interested in phantom-attack are comparing it to the libraries listed below
- Dectect syscall hooking using eBPF☆151Updated 2 years ago
- ☆100Updated 3 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆174Updated last year
- An IDA processor for eBPF bytecode☆47Updated 3 years ago
- An IDA processor for eBPF bytecode☆63Updated 5 months ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆161Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆73Updated 2 years ago
- fuzz the linux kernel bpf verifier☆78Updated 3 years ago
- ☆126Updated 2 months ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆156Updated 7 months ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆56Updated last year
- An exploit primitive in linux kernel inspired by DirtyPipe☆93Updated 3 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- My conference presentations and Materials for them.☆32Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆35Updated 5 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- ☆137Updated 3 years ago
- Very Simple Fuzzer☆20Updated 4 years ago
- Linux Kernel N-day Exploit/Analysis.☆64Updated 6 months ago
- qemu vulnerablity.☆52Updated 3 years ago
- some kernel exploit challenges and cve analysis☆26Updated 6 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆25Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆64Updated last year
- Binary exploitation by confusing the unwinder☆61Updated 2 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago