A Windows utility to elevate any process to nt authority\system using physical memory.
-
Updated
Apr 28, 2023 - C++
A Windows utility to elevate any process to nt authority\system using physical memory.
Collection of Linux PrivEsc Tools
Vulnerable Driver Exploit
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
🇹🇷 kernel hacklemenin temellerini öğrenin
A dll injector static library for Win x64 processes with handle elevation supported
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
The Nintendo Wii U TCP Gecko Installer engine homebrew application for game modding and research
Exploit MsIo vulnerable driver
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
x64 Windows kernel driver mapper, inject unsigned driver using anycall
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Linux Kernel exploitation Tutorial.
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
a series tutorial for linux exploit development to newbie.
Add a description, image, and links to the kernel-exploit topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploit topic, visit your repo's landing page and select "manage topics."