Repository navigation
kernel-exploitation
- Website
- Wikipedia
Linux privilege escalation auditing tool
A collection of links related to Linux kernel security and exploitation
📦 Make security testing of K8s, Docker, and Containerd easier.
My proof-of-concept exploits for the Linux kernel
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Linux Kernel exploitation Tutorial.
Linux kernel module implementation & exploitation (pwn) labs.
Android kernel exploitation for CVE-2022-20409
Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)
Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Linux & Android Kernel Vulnerability research and exploitation
A powerful Linux privilege escalation scanner — a feature-rich and modern alternative to LinPEAS, built for speed, depth, and clarity.
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
Some basic info, resources, and code snippets about windows kernel exploitation
Custom Linux Kernel exploited by custom exploit
Kernel hacklemenin temellerini öğrenin (🇹🇷 Türkçe bir kaynak)
Our artifacts to our Paper: "Algorithmic Heap Layout Manipulation in the Linux Kernel"
Toolkit that allows to extract and compress initramfs cpio, useful for Linux kernel exploitation.