The Never-Ending Hide and Seek: The Tale of APTX4869 Rootkit
-
Updated
Sep 18, 2024 - C
The Never-Ending Hide and Seek: The Tale of APTX4869 Rootkit
🇹🇷 kernel hacklemenin temellerini öğrenin
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
a series tutorial for linux exploit development to newbie.
The Nintendo Wii U TCP Gecko Installer engine homebrew application for game modding and research
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15
Linux Kernel exploitation Tutorial.
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
Add a description, image, and links to the kernel-exploit topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploit topic, visit your repo's landing page and select "manage topics."