The Wayback Machine - https://web.archive.org/web/20220408085446/https://github.com/topics/kernel-exploit
Here are
15 public repositories
matching this topic...
a series tutorial for linux exploit development to newbie.
macOS Kernel Exploit for CVE-2019-8781.
Tutorial for writing kernel exploits
Linux Kernel exploitation Tutorial.
[ KASLD ] Kernel Address Space Layout Derandomization - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Updated
Oct 15, 2020
Objective-C
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
Exploit MsIo vulnerable driver
x64 Windows kernel driver mapper, inject unsigned driver using anycall
A light and fast cheat loader with xor-ing and auth-ing (backend can easily be re-created if you know what you are doing) x64 ring0 variant.
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
A dll injector static library for Win x64 processes with handle elevation supported
Kernsec is a program to print kernel protections, useful informations of kernel exploitation/pwn in Kernel Land
Updated
Sep 16, 2021
Shell
Code execution for CVE-2017-11176
Improve this page
Add a description, image, and links to the
kernel-exploit
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
kernel-exploit
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.