roddux / germyLinks
GERMY is a Linux Kernel n-day in the N_GSM line discipline
☆48Updated last year
Alternatives and similar repositories for germy
Users that are interested in germy are comparing it to the libraries listed below
Sorting:
- A few examples of how to trap virtual memory access on Windows.☆30Updated 5 months ago
- ☆46Updated 2 months ago
- ☆34Updated last year
- ☆33Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Report and exploit of CVE-2023-36427☆90Updated last year
- Windows KASLR bypass using prefetch side-channel☆100Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 7 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 3 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆74Updated 3 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- ☆12Updated 7 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 5 months ago
- V8sandbox_bypass using stack misalignment☆19Updated 9 months ago
- Attacking the cleanup_module function of a kernel module☆34Updated 2 months ago
- Analysis of the vulnerability☆51Updated last year
- ☆18Updated 2 years ago
- Slide of my conference presentations☆14Updated 8 months ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- poc code for CVE-2024-38080☆30Updated 9 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆93Updated 7 months ago
- javascript extension of windbg for hacker.☆15Updated last year
- ☆26Updated last year
- ☆28Updated last year
- ☆23Updated 4 months ago
- ☆30Updated 5 months ago
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago