a series tutorial for linux exploit development to newbie.
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kern...
翻译 - [KASLD]内核地址空间布局去随机化-各种技术的集合,这些技术绕过KASLR并以非特权用户身份在x86 / x86_64体系结构上检索Linux内核基础虚拟地址。
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
macOS Kernel Exploit for CVE-2019-8781.
翻译 - 适用于CVE-2019-8781的macOS内核漏洞利用。该错误的功劳归于@LinusHenze :)。
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
Linux Kernel exploitation Tutorial.
Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15
x64 Windows kernel driver mapper, inject unsigned driver using anycall
Exploit MsIo vulnerable driver
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
A dll injector static library for Win x64 processes with handle elevation supported
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
Kernel hacklemenin temellerini öğrenin (🇹🇷 Türkçe bir kaynak)
Collection of Linux PrivEsc Tools
A Windows utility to elevate any process to nt authority\system using physical memory.