Linux Kernel 2.4.22 kernel Buffer overflow vulnerabilities and exploit
-
Updated
Oct 16, 2015 - C
Linux Kernel 2.4.22 kernel Buffer overflow vulnerabilities and exploit
My writeups for Binary Exploitation wargames on OverTheWire
Linux Kernel exploitation Tutorial.
exploits for HEVD
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
Linux kernel exploitation notları
Linux kernel module implementation & exploitation (pwn) labs.
My proof-of-concept exploits for the Linux kernel
Custom Linux Kernel exploited by custom exploit
A collection of kernel exploits written by me.
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215
Our artifacts to our Paper: "Algorithmic Heap Layout Manipulation in the Linux Kernel"
Some basic info, resources, and code snippets about windows kernel exploitation
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
A Windows utility to elevate any process to nt authority\system using physical memory.
Android kernel exploitation for CVE-2022-20409
Uses the microsoft-signed truesight.sys to escalate privileges
Linux & Android Kernel Vulnerability research and exploitation
Linux privilege escalation auditing tool
Add a description, image, and links to the kernel-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploitation topic, visit your repo's landing page and select "manage topics."