☆90Jun 23, 2016Updated 9 years ago
Alternatives and similar repositories for kernel_rop
Users that are interested in kernel_rop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kASLR (Intel TSX/RTM) bypass static library☆77Oct 15, 2017Updated 8 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Sep 18, 2016Updated 9 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Oct 1, 2013Updated 12 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 7 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Magellan PoC☆33Jan 23, 2019Updated 7 years ago
- CVE-2014-4322 Exploit☆23Jan 24, 2016Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- ☆120Apr 1, 2018Updated 8 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- PoC exploit for CVE-2016-4622☆108Sep 18, 2023Updated 2 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆31Apr 20, 2016Updated 10 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- A linux system call fuzzer using TriforceAFL☆178Feb 28, 2024Updated 2 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- ☆139Jul 17, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 10 years ago
- The slides and exploit of mosec2016☆111Jul 4, 2016Updated 9 years ago
- Exploit code for CVE-2016-1757☆85Apr 27, 2016Updated 10 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆155Apr 1, 2018Updated 8 years ago
- ☆27May 5, 2016Updated 10 years ago
- exploit code for a bpf heap overflow vulnerability☆27Sep 3, 2019Updated 6 years ago
- Android application fuzzing framework with fuzzers and crash monitor.☆294Oct 2, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Apr 7, 2016Updated 10 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆164Jun 14, 2017Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 10 years ago
- ☆568May 30, 2018Updated 7 years ago
- My proof-of-concept exploits for the Linux kernel☆1,575Sep 11, 2025Updated 8 months ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago