a series tutorial for linux exploit development to newbie.
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kern...
x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
Linux Kernel exploitation Tutorial.
x64 Windows kernel driver mapper, inject unsigned driver using anycall
Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls
Userland -> Kernel11 -> Arm9 otherapp for 3DS system versions 1.0 to <= 11.15
Exploit MsIo vulnerable driver
A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)
PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR
abusing signed pdfwkrnl.sys for kernel function calling from usermode.
A dll injector static library for Win x64 processes with handle elevation supported
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
Kernel hacklemenin temellerini öğrenin (🇹🇷 Türkçe bir kaynak)
#IOS#Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, exploiting WebKit (CVE-2025-24201) and Core Media (CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Tr...
A Windows utility to elevate any process to nt authority\system using physical memory.