a series tutorial for linux exploit development to newbie.
-
Updated
Apr 12, 2024 - C
a series tutorial for linux exploit development to newbie.
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
Linux Kernel exploitation Tutorial.
Exploit MsIo vulnerable driver
x64 Windows kernel driver mapper, inject unsigned driver using anycall
The Nintendo Wii U TCP Gecko Installer engine homebrew application for game modding and research
Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
A dll injector static library for Win x64 processes with handle elevation supported
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
The Never-Ending Hide and Seek: The Tale of APTX4869 Rootkit
🇹🇷 kernel hacklemenin temellerini öğrenin
A Windows utility to elevate any process to nt authority\system using physical memory.
Collection of Linux PrivEsc Tools
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
Add a description, image, and links to the kernel-exploit topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploit topic, visit your repo's landing page and select "manage topics."