☆91Jun 23, 2016Updated 9 years ago
Alternatives and similar repositories for kernel_rop
Users that are interested in kernel_rop are comparing it to the libraries listed below
Sorting:
- Linux kASLR (Intel TSX/RTM) bypass static library☆79Oct 15, 2017Updated 8 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆92Sep 18, 2016Updated 9 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- ☆121Apr 1, 2018Updated 7 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- PoC exploit for CVE-2016-4622☆109Sep 18, 2023Updated 2 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated 2 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 9 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- ☆27May 5, 2016Updated 9 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- Android application fuzzing framework with fuzzers and crash monitor.☆293Oct 2, 2020Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- ☆567May 30, 2018Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- My proof-of-concept exploits for the Linux kernel☆1,569Sep 11, 2025Updated 6 months ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago