Linking pages
- A Kernel Hacker Meets Fuchsia OS | Alexander Popov https://a13xp0p0v.github.io/2022/05/24/pwn-fuchsia.html 338 comments
- Put an io_uring on it: Exploiting the Linux Kernel - Blog | Grapl https://www.graplsecurity.com/post/iou-ring-exploiting-the-linux-kernel 27 comments
- A Kernel Hacker Meets Fuchsia OS – PT SWARM https://swarm.ptsecurity.com/a-kernel-hacker-meets-fuchsia-os/ 4 comments
- GitHub - xairy/linux-kernel-exploitation: A collection of links related to Linux kernel security and exploitation https://github.com/xairy/linux-kernel-exploitation 0 comments
- [BugTales] Da Vinci Hits a Nerve: Exploiting Huawei’s NPU Driver - taszk.io labs https://labs.taszk.io/articles/post/exploiting_huaweis_npu_driver/ 0 comments
- GitHub - bcoles/kasld: Kernel Address Space Layout Derandomization [ KASLD ] - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR). https://github.com/bcoles/kasld 0 comments
- ZDI-24-821: A Remote UAF in The Kernel's net/tipc https://sam4k.com/zdi-24-821-a-remote-use-after-free-in-the-kernels-net-tipc/ 0 comments
Linked pages
- Project Zero: A survey of recent iOS kernel exploits https://googleprojectzero.blogspot.com/2020/06/a-survey-of-recent-ios-kernel-exploits.html 70 comments
- Project Zero: Bad Binder: Android In-The-Wild Exploit https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html 52 comments
- Linux kernel heap quarantine versus use-after-free exploits | Alexander Popov https://a13xp0p0v.github.io/2020/11/30/slab-quarantine.html 41 comments
- GitHub - a13xp0p0v/linux-kernel-defence-map: Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies https://github.com/a13xp0p0v/linux-kernel-defence-map 34 comments
- CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem | Alexander Popov https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html 4 comments
- CVE-2017-2636: Exploit the race condition in the n_hdlc Linux kernel driver | Alexander Popov https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html 2 comments
- GitHub - a13xp0p0v/kconfig-hardened-check: A tool for checking the security hardening options of the Linux kernel https://github.com/a13xp0p0v/kconfig-hardened-check 0 comments
- [2009.01694] The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects https://arxiv.org/abs/2009.01694 0 comments
- Arm MTE architecture: Enhancing memory safety - Architectures and Processors blog - Arm Community blogs - Arm Community https://community.arm.com/developer/ip-products/processors/b/processors-ip-blog/posts/enhancing-memory-safety 0 comments
- grsecurity http://grsecurity.net/ 0 comments
- GitHub - google/syzkaller: syzkaller is an unsupervised coverage-guided kernel fuzzer https://github.com/google/syzkaller#syzkaller---kernel-fuzzer 0 comments
Related searches:
Search whole site: site:a13xp0p0v.github.io
Search title: Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel | Alexander Popov
See how to search.