More
Stars
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
The Linux Kernel Module Programming Guide (updated for 5.0+ kernels)
A utility to convert your AWS CLI credentials into AWS console access.
Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
Managing BitLocker from WinPE Environment
Local privilege escalation PoC for Linux kernel CVE-2022-1015
Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.
A collection of links related to Linux kernel security and exploitation
Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.
Implement a simple Zone Allocator in BSD and XNU kernel (learning purpose)
A fully compliant RISC-V computer made inside the game Terraria
IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions
Linux kernel module implementation & exploitation (pwn) labs.
Unofficial mirror of sourceware glibc repository. Updated daily.
A repository for learning various heap exploitation techniques.