xairy / kernel-exploitsLinks
My proof-of-concept exploits for the Linux kernel
☆1,472Updated 3 years ago
Alternatives and similar repositories for kernel-exploits
Users that are interested in kernel-exploits are comparing it to the libraries listed below
Sorting:
- LibZeroEvil & the Research Rootkit project.☆593Updated 3 years ago
- a series tutorial for linux exploit development to newbie.☆558Updated last year
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆812Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆956Updated 4 years ago
- Various kernel exploits☆778Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,791Updated 11 years ago
- Tracking CVEs for the linux Kernel☆748Updated last year
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,968Updated 3 months ago
- The Damn Vulnerable Router Firmware Project☆688Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆536Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- PoC for Dirty COW (CVE-2016-5195)☆500Updated 3 years ago
- Build a database of libc offsets to simplify exploitation☆1,785Updated 7 months ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆799Updated last year
- A collection of links related to VMware escape exploits☆1,426Updated 8 months ago
- ☆1,154Updated 8 years ago
- Some helpful preload libraries for pwning stuff.☆1,613Updated last week
- Vulnerability Labs for security analysis☆1,172Updated 4 years ago
- Script for searching the extracted firmware file system for goodies!☆1,128Updated last year
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,942Updated 2 weeks ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆656Updated 7 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,932Updated 10 months ago
- A list of my CVE's with POCs☆675Updated 4 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- gdb for pwn☆924Updated 9 months ago
- For Linux binary Exploitation☆832Updated 7 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,301Updated 5 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,259Updated 2 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago