HyggeHalcyon
Search...
Ctrl
K
Github
LinkedIn
More
Github
LinkedIn
Resources
Cyber Security
Binary Exploitation
Linux Kernel Exploitation
Previous
Heap Exploitation
Next
Windows Exploitation
Last updated
12 months ago
Introduction
System Calls
Lab Environment and Basics
Modprobe
The Idea
TO-DO
Example Writeups
Double Fetch
The Idea
Example Writeups
TO-DO
Pool of Links
📚
Introduction of Kernel Pwn: Double Fetch
n132
Kernel Exploitation Techniques: modprobe_path
sam4k
Learning Linux kernel exploitation - Part 1 - Laying the groundwork
Low-level adventures
Learning Linux Kernel Exploitation - Part 1
Midas Blog
The Definitive Guide to Linux System Calls | Packagecloud Blog
packagecloudio
System calls, Execution privilege, userland vs kerneland execution switch etc
Imaginary CTF 2023 has just en - HackMD
HackMD