yeyintminthuhtut / Awesome-Study-Resources-for-Kernel-Hacking
Kernel Hacking study materials collection
☆106Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for Awesome-Study-Resources-for-Kernel-Hacking
- Exploitation challenges for CTF☆62Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆94Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆58Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Personal repository for all ctf related stuffs☆68Updated 3 years ago
- r2con2019 - slides and materials☆135Updated 4 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- ☆122Updated 6 years ago
- linux rootkit☆156Updated 6 years ago
- Fork of mona.py with x64dbg support☆97Updated 2 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated this week
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- ☆35Updated 6 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆166Updated 5 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆76Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆55Updated 6 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago