Linux privilege escalation auditing tool
-
Updated
Feb 17, 2024 - Shell
Linux privilege escalation auditing tool
A collection of links related to Linux kernel security and exploitation
📦 Make security testing of K8s, Docker, and Containerd easier.
My proof-of-concept exploits for the Linux kernel
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Linux Kernel exploitation Tutorial.
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Linux kernel module implementation & exploitation (pwn) labs.
Android kernel exploitation for CVE-2022-20409
Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)
Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215
Linux & Android Kernel Vulnerability research and exploitation
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
Some basic info, resources, and code snippets about windows kernel exploitation
Custom Linux Kernel exploited by custom exploit
🇹🇷 kernel hacklemenin temellerini öğrenin
Our artifacts to our Paper: "Algorithmic Heap Layout Manipulation in the Linux Kernel"
Toolkit that allows to extract and compress initramfs cpio, useful for Linux kernel exploitation.
Linux kernel exploitation notları
Add a description, image, and links to the kernel-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploitation topic, visit your repo's landing page and select "manage topics."