Some kernel exploits
☆146Nov 7, 2017Updated 8 years ago
Alternatives and similar repositories for kernel-exploits
Users that are interested in kernel-exploits are comparing it to the libraries listed below
Sorting:
- ☆190Oct 25, 2017Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- some vul☆791Apr 25, 2025Updated 10 months ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- ☆14Nov 1, 2016Updated 9 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆88Apr 3, 2017Updated 8 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- PoC code for CVE-2019-14040☆27Apr 15, 2020Updated 5 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- Linux kASLR (Intel TSX/RTM) bypass static library☆79Oct 15, 2017Updated 8 years ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆422May 18, 2018Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- ☆32Nov 15, 2017Updated 8 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- macOS Kernel Fuzzer☆258Oct 23, 2017Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago