File tree 1 file changed +3
-3
lines changed
1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change 1
1
# research
2
2
the core papers i researched about kernel security.
3
3
4
- Exploit linux kernel slub overflow </ a >Exploit linux kernel slub overflow . 2010
4
+ Exploit linux kernel slub overflow. 2010
5
5
6
6
Kernel stack overflow with sub %%esp, it's different with stack buffer overflow. 2010
7
7
Exploit linux kernel stack buffer overflow on 2.6 kernels and slab overflow on 2.4 kernels. 2010
8
8
How to Exploit Linux Kernel NULL Pointer Dereference. 2010
9
9
CC_STACKPROTECTOR patch Analysis. 2010
10
- Freebsd kernel heap exploitation </ a >Freebsd kernel heap exploitation . 2010
11
- Bypass linux kernel module version check </ a >Install LKM rootkits without kernel dev package . 2010
10
+ Freebsd kernel heap exploitation. 2010
11
+ Bypass linux kernel module version check. 2010
12
12
Hack dev mem for fun. 2009
13
13
Advanced linux kernel inline hook implemention. 2009
14
14
linux kernel inline hook with copied opcode. 2009
You can’t perform that action at this time.
0 commit comments