Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

kernel-exploit

Here are 27 public repositories matching this topic...

a series tutorial for linux exploit development to newbie.

  • UpdatedApr 12, 2024
  • C

Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).

  • UpdatedApr 13, 2024
  • C

x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration

  • UpdatedJul 6, 2022
  • C++
evil-mhyprot-cli

A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.

  • UpdatedJul 3, 2021
  • C++

macOS Kernel Exploit for CVE-2019-8781.

  • UpdatedOct 15, 2019
  • C

Tutorial for writing kernel exploits

  • UpdatedAug 10, 2025
  • C

Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls

  • UpdatedAug 31, 2025
  • Rust

x64 Windows kernel driver mapper, inject unsigned driver using anycall

  • UpdatedFeb 14, 2024
  • C++

Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15

  • UpdatedJan 7, 2023
  • C

Exploit MsIo vulnerable driver

  • UpdatedAug 12, 2021
  • C++

A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854

  • UpdatedOct 15, 2020
  • Objective-C

Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)

  • UpdatedJun 15, 2025
  • C++

The Nintendo Wii U TCP Gecko Installer engine homebrew application for game modding and research

  • UpdatedMar 27, 2024
  • C

PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR

  • UpdatedJun 26, 2020
  • C

Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), then WebKit(CVE-2025-24201) and Core Media(CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction.

  • UpdatedNov 27, 2025

A portfolio demonstrating advanced blue and red team skills, including: SSH MFA implementation, Volatility-based memory forensics to detect code injection, Splunk threat hunting (BOTS v3), Wireshark C2 analysis, and kernel exploitation walkthroughs (LinPEAS, VulnHub).

  • UpdatedOct 19, 2025

A dll injector static library for Win x64 processes with handle elevation supported

  • UpdatedMar 28, 2021
  • C++

Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.

  • UpdatedOct 15, 2023
  • C

A Windows utility to elevate any process to nt authority\system using physical memory.

  • UpdatedOct 1, 2025
  • C++

Improve this page

Add a description, image, and links to thekernel-exploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with thekernel-exploit topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2025 Movatter.jp