Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.
☆62Nov 3, 2022Updated 3 years ago
Alternatives and similar repositories for linux-kernel-resources
Users that are interested in linux-kernel-resources are comparing it to the libraries listed below
Sorting:
- kernel-pwn and writeup collection☆700Oct 2, 2023Updated 2 years ago
- A hacky tool for analysing linux kernel commits☆38Feb 7, 2023Updated 3 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Nov 24, 2022Updated 3 years ago
- WebGL fuzzer☆39Mar 13, 2023Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Mar 21, 2023Updated 2 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- M5Stack HAL9000 simulator☆12Oct 8, 2023Updated 2 years ago
- Explore a live Linux kernel's memory using GDB☆117Oct 20, 2022Updated 3 years ago
- ☆26May 10, 2021Updated 4 years ago
- Linux Kernel Fuzzer Corpus☆156Updated this week
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- SALT - SLUB ALlocator Tracer for the Linux kernel☆156Sep 10, 2018Updated 7 years ago
- An IDAPython script to decompile all the functions of an executable and dump the pseudocode☆31Sep 13, 2022Updated 3 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆211Jan 26, 2022Updated 4 years ago
- ☆64Mar 29, 2022Updated 3 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 weeks ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,278Jan 29, 2026Updated last month
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- ☆16Jan 23, 2022Updated 4 years ago
- Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476)☆19Jun 20, 2023Updated 2 years ago
- Finding security vulnerabilities with CodeQL in C/C++☆13Mar 25, 2021Updated 4 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- Research Links for LLM Security☆17May 27, 2024Updated last year
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- All Files, Scripts, and exploits can be found here☆74Apr 16, 2021Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Jul 27, 2022Updated 3 years ago
- ☆472Oct 27, 2025Updated 4 months ago
- ☆20Jun 13, 2022Updated 3 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- ☆127Nov 12, 2024Updated last year
- ☆67Jan 8, 2020Updated 6 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- ☆16Mar 23, 2018Updated 7 years ago
- ☆81Sep 7, 2023Updated 2 years ago