a series tutorial for linux exploit development to newbie.
-
Updated
Apr 12, 2024 - C
a series tutorial for linux exploit development to newbie.
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
Linux Kernel exploitation Tutorial.
x64 Windows kernel driver mapper, inject unsigned driver using anycall
Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls
Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15
Exploit MsIo vulnerable driver
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)
The Nintendo Wii U TCP Gecko Installer engine homebrew application for game modding and research
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
abusing signed pdfwkrnl.sys for kernel function calling from usermode.
A dll injector static library for Win x64 processes with handle elevation supported
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
Kernel hacklemenin temellerini öğrenin (🇹🇷 Türkçe bir kaynak)
A Windows utility to elevate any process to nt authority\system using physical memory.
Add a description, image, and links to the kernel-exploit topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploit topic, visit your repo's landing page and select "manage topics."