xairy / kernel-exploitsLinks
My proof-of-concept exploits for the Linux kernel
☆1,513Updated 3 weeks ago
Alternatives and similar repositories for kernel-exploits
Users that are interested in kernel-exploits are comparing it to the libraries listed below
Sorting:
- LibZeroEvil & the Research Rootkit project.☆595Updated 3 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆965Updated 4 years ago
- Various kernel exploits☆795Updated last year
- a series tutorial for linux exploit development to newbie.☆566Updated last year
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆814Updated last year
- The Damn Vulnerable Router Firmware Project☆695Updated 4 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆818Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- Tracking CVEs for the linux Kernel☆751Updated last year
- A collection of links related to VMware escape exploits☆1,462Updated last year
- Some helpful preload libraries for pwning stuff.☆1,628Updated 4 months ago
- Script for searching the extracted firmware file system for goodies!☆1,166Updated 2 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,981Updated last year
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,012Updated 2 weeks ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆803Updated last year
- chw00t - Unices chroot breaking tool☆607Updated 6 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago
- Vulnerability Labs for security analysis☆1,175Updated 4 years ago
- Linux Exploit Suggester; based on operating system release number☆1,803Updated 11 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,035Updated 7 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,140Updated 2 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆541Updated 3 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,501Updated last year
- Build a database of libc offsets to simplify exploitation☆1,821Updated 11 months ago
- Attify OS - Distro for pentesting IoT devices☆1,006Updated 4 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆663Updated 7 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,307Updated 6 years ago
- Checksec☆2,215Updated 3 weeks ago
- For Linux binary Exploitation☆840Updated 7 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,267Updated 2 years ago