HyggeHalcyon
Github
LinkedIn
More
Github
LinkedIn
Search...
Ctrl + K
Resources
Cyber Security
Binary Exploitation
Linux Kernel Exploitation
Previous
Heap Exploitation
Next
Windows Exploitation
Last updated
9 months ago
Introduction
System Calls
Lab Environment and Basics
Modprobe
The Idea
TO-DO
Example Writeups
Double Fetch
The Idea
Example Writeups
TO-DO
Pool of Links
📚
Introduction
System Calls
Lab Environment and Basics
Modprobe
The Idea
Example Writeups
Double Fetch
The Idea
Example Writeups
Pool of Links
The Definitive Guide to Linux System Calls | Packagecloud Blog
packagecloudio
System calls, Execution privilege, userland vs kerneland execution switch etc
Learning Linux Kernel Exploitation - Part 1
Midas Blog
Learning Linux kernel exploitation - Part 1 - Laying the groundwork
Low-level adventures
Kernel Exploitation Techniques: modprobe_path
sam4k
Imaginary CTF 2023 has just en - HackMD
HackMD
Introduction of Kernel Pwn: Double Fetch
n132