A Windows utility to elevate any process to nt authority\system using physical memory.
-
Updated
Apr 28, 2023 - C++
A Windows utility to elevate any process to nt authority\system using physical memory.
Collection of Linux PrivEsc Tools
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
🇹🇷 kernel hacklemenin temellerini öğrenin
The Never-Ending Hide and Seek: The Tale of APTX4869 Rootkit
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
A dll injector static library for Win x64 processes with handle elevation supported
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15
The Nintendo Wii U TCP Gecko Installer engine homebrew application for game modding and research
x64 Windows kernel driver mapper, inject unsigned driver using anycall
Linux Kernel exploitation Tutorial.
Exploit MsIo vulnerable driver
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
a series tutorial for linux exploit development to newbie.
Add a description, image, and links to the kernel-exploit topic page so that developers can more easily learn about it.
To associate your repository with the kernel-exploit topic, visit your repo's landing page and select "manage topics."