Kernel-exploit-tech

Kernel Exploitation Tutorial

A tutorial and resource for learning Linux kernel exploitation techniques

Linux Kernel exploitation Tutorial.

GitHub

262 stars
14 watching
35 forks
Language: C
last commit: over 4 years ago
kernel-exploitkernel-exploitationlinux-kernellinux-kernel-hackingtutorial-exercisestutorials

Related projects:

Repository Description Stars
xairy/kernel-exploits A collection of proof-of-concept exploits for vulnerabilities in the Linux kernel 1,450
gregkh/kernel-tutorial A tutorial on writing and submitting kernel patches to the Linux kernel project 1,111
rosehgal/binexp A tutorial project on exploiting binary files and writing payloads to manipulate program behavior 1,303
spencerdodd/kernelpop Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. 687
ngalongc/autolocalprivilegeescalation Automates download and compilation of Linux kernel exploits from exploitdb 486
zen-kernel/zen-kernel A Linux kernel distribution with documentation and guides for developers and users 2,026
jondonas/linux-exploit-suggester-2 Tools to help find and retrieve Linux exploit code from Exploit DB 1,858
lkl/linux Enables efficient reuse of Linux kernel code in applications 819
a13xp0p0v/linux-kernel-defence-map A graphical representation of Linux kernel security concepts and their relationships 1,777
gregkh/kernel-development A presentation on the development process of a widely-used operating system kernel 622
felix-pb/kfd Exploits vulnerabilities to read and write kernel memory on Apple devices 874
dreamos82/dreamos64 An experimental 64-bit kernel project that demonstrates low-level programming concepts and basic operating system functionality. 166
intelisecurelabs/linux_exploit_suggester Provides a list of possible exploits based on the Linux operating system release version. 1,779
sslab-gatech/pwn2own2020 An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS 402
ionescu007/r0ak A tool for inspecting and modifying kernel-mode code on Windows systems with limited privileges. 28