diff options
| author | Andrey Konovalov | 2026-03-05 00:23:45 +0100 |
|---|---|---|
| committer | Andrey Konovalov | 2026-03-05 00:23:45 +0100 |
| commit | 80d541e519e9f4b14394697259906b7a721b6dd5 (patch) | |
| tree | 2fbb6ee1b78218512ba163722b27cf92bf9e3af8 /README.md | |
| parent | 204e63139c7da72760aa21e81db4cb0fc05991c5 (diff) | |
January/February updates
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 66 |
1 files changed, 62 insertions, 4 deletions
| @@ -52,6 +52,12 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 52 | 52 | ||
| 53 | ### Exploitation | 53 | ### Exploitation |
| 54 | 54 | ||
| 55 | [2026: "DIRTYFREE: Simplified Data-Oriented Programming in the Linux Kernel"](https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf) [paper] | ||
| 56 | |||
| 57 | [2026: "Table Manners: Diving into Linux pagetables exp techniques" by Lau](https://github.com/Notselwyn/blogpost-files/blob/main/talk_pagetables.pdf) [slides] | ||
| 58 | |||
| 59 | [2025: "BRIDGEROUTER: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel"](https://www.youwei.site/papers/SP2025b.pdf) [paper] | ||
| 60 | |||
| 55 | [2025: "Extending Kernel Race Windows Using '/dev/shm'" by Faith](https://faith2dxy.xyz/2025-11-28/extending_race_window_fallocate/) [article] | 61 | [2025: "Extending Kernel Race Windows Using '/dev/shm'" by Faith](https://faith2dxy.xyz/2025-11-28/extending_race_window_fallocate/) [article] |
| 56 | 62 | ||
| 57 | [2025: "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System"](https://kylebot.net/papers/ret2entry.pdf) [paper] | 63 | [2025: "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System"](https://kylebot.net/papers/ret2entry.pdf) [paper] |
| @@ -313,6 +319,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 313 | 319 | ||
| 314 | ### Protection Bypasses | 320 | ### Protection Bypasses |
| 315 | 321 | ||
| 322 | [2026: "Revisiting Two-Shot Kernel Shellcode Execution From Control Flow Hijacking" by Jennifer Miller](https://blog.zolutal.io/two-shot-kernel-shellcode/) [article] | ||
| 323 | |||
| 316 | [2025: "Defeating KASLR by Doing Nothing at All" by Seth Jenkins](https://googleprojectzero.blogspot.com/2025/11/defeating-kaslr-by-doing-nothing-at-all.html) [article] | 324 | [2025: "Defeating KASLR by Doing Nothing at All" by Seth Jenkins](https://googleprojectzero.blogspot.com/2025/11/defeating-kaslr-by-doing-nothing-at-all.html) [article] |
| 317 | 325 | ||
| 318 | [2025: "The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction" by Pumpkin Chang](https://u1f383.github.io/linux/2025/06/26/the-journey-of-bypassing-ubuntus-unprivileged-namespace-restriction.html) [article] | 326 | [2025: "The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction" by Pumpkin Chang](https://u1f383.github.io/linux/2025/06/26/the-journey-of-bypassing-ubuntus-unprivileged-namespace-restriction.html) [article] |
| @@ -478,6 +486,16 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 478 | 486 | ||
| 479 | ### LPE | 487 | ### LPE |
| 480 | 488 | ||
| 489 | [2026: "A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets"](https://blog.calif.io/p/a-race-within-a-race-exploiting-cve) [article] [CVE-2025-38617] | ||
| 490 | |||
| 491 | [2026: "Linux Kernel net/sched CAKE Qdisc Use-After-Free LPE" by Noamr](https://ssd-disclosure.com/linux-kernel-net-sched-cake-qdisc-use-after-free-lpe/) [article] [CVE-UNKNOWN] | ||
| 492 | |||
| 493 | [2026: "[Cryptodev-linux] Page-level UAF exploitation" by nasm](https://nasm.re/posts/cryptodev-linux-vuln/) [article] [NO-CVE] | ||
| 494 | |||
| 495 | [2026: "A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave" by Seth Jenkins](https://projectzero.google/2026/01/pixel-0-click-part-2.html) [article] [CVE-2025-36934] | ||
| 496 | |||
| 497 | [2026: "Translator/Mali Utgard Hacking"](https://luke-m.xyz/translator) [articles] [[exploits](https://github.com/lr-m/RIPMaliUtgard)] [CVE-UNKNOWN] | ||
| 498 | |||
| 481 | [2025: "A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot" by Yong Wang](https://github.com/ThomasKing2014/slides/blob/master/2025/poc2025.pdf) [slides] [CVE-UNKNOWN] | 499 | [2025: "A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot" by Yong Wang](https://github.com/ThomasKing2014/slides/blob/master/2025/poc2025.pdf) [slides] [CVE-UNKNOWN] |
| 482 | 500 | ||
| 483 | [2025: "CVE-2025-38352 (Part 1) - In-the-wild Android Kernel Vulnerability Analysis + PoC" by Faith](https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/) [article] [CVE-2025-38352] | 501 | [2025: "CVE-2025-38352 (Part 1) - In-the-wild Android Kernel Vulnerability Analysis + PoC" by Faith](https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/) [article] [CVE-2025-38352] |
| @@ -488,7 +506,7 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 488 | 506 | ||
| 489 | [2025: "Dangling pointers, fragile memory—from an undisclosed vulnerability to Pixel 9 Pro privilege escalation"](https://dawnslab.jd.com/Pixel_9_Pro_EoP/) [article] [CVE-2025-6349] [CVE-2025-8045] | 507 | [2025: "Dangling pointers, fragile memory—from an undisclosed vulnerability to Pixel 9 Pro privilege escalation"](https://dawnslab.jd.com/Pixel_9_Pro_EoP/) [article] [CVE-2025-6349] [CVE-2025-8045] |
| 490 | 508 | ||
| 491 | [2025: "Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers" by Xingyu Jin and Martijn Bogaard](https://powerofcommunity.net/2025/slide/x-84592.pdf) [slides] [CVE-2024-44068] [CVE‑2025‑23244] [CVE-2025-8109] [CVE-2024-49739] | 509 | [2025: "Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers" by Xingyu Jin and Martijn Bogaard](https://powerofcommunity.net/2025/slide/x-84592.pdf) [slides] [[video](https://www.youtube.com/watch?v=yAUJFrPjfCI)] [CVE-2024-44068] [CVE‑2025‑23244] [CVE-2025-8109] [CVE-2024-49739] |
| 492 | 510 | ||
| 493 | [2025: "Déjà Vu in Linux io_uring: Breaking Memory Sharing Again After Generations of Fixes" by Pumpkin Chang](https://u1f383.github.io/slides/talks/2025_Hexacon-Deja_Vu_in_Linux_io_uring_Breaking_Memory_Sharing_Again_After_Generations_of_Fixes.pdf) [slides] [[video](https://www.youtube.com/watch?v=Ry4eOgLCo90)] [CVE-2025-21836] | 511 | [2025: "Déjà Vu in Linux io_uring: Breaking Memory Sharing Again After Generations of Fixes" by Pumpkin Chang](https://u1f383.github.io/slides/talks/2025_Hexacon-Deja_Vu_in_Linux_io_uring_Breaking_Memory_Sharing_Again_After_Generations_of_Fixes.pdf) [slides] [[video](https://www.youtube.com/watch?v=Ry4eOgLCo90)] [CVE-2025-21836] |
| 494 | 512 | ||
| @@ -1100,6 +1118,10 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 1100 | 1118 | ||
| 1101 | ### Other | 1119 | ### Other |
| 1102 | 1120 | ||
| 1121 | [2026: "TTLM Parsing in WiFi/mac8021 one‑byte look past (over-the-air)" by Ruikai Peng](https://bugs.pwno.io/0032) [article] [CVE-UNKNOWN] | ||
| 1122 | |||
| 1123 | [2025: "Glitching Google's TV Streamer From Adb To Root" by Niek Timmers](https://hardwear.io/netherlands-2025/presentation/Glitching-Googles-TV-Streamer-from-adb-to-root.pdf) [slides] [[video](https://www.youtube.com/watch?v=-w5mpXTnNJA)] [NO-CVE] | ||
| 1124 | |||
| 1103 | [2025: "mediatek? more like media-rekt, amirite." by hypr](https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html) [article] | 1125 | [2025: "mediatek? more like media-rekt, amirite." by hypr](https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html) [article] |
| 1104 | 1126 | ||
| 1105 | [2025: "Dissecting a 1-Day Vulnerability in Linux's XFRM Subsystem" by Shreyas Penkar](https://streypaws.github.io/posts/Dissecting-a-1-Day-Vulnerability-in-Linux-XFRM-Subsystem/) [article] [CVE-2025-39965] [[trigger](https://github.com/Shreyas-Penkar/CVE-2025-39965)] | 1127 | [2025: "Dissecting a 1-Day Vulnerability in Linux's XFRM Subsystem" by Shreyas Penkar](https://streypaws.github.io/posts/Dissecting-a-1-Day-Vulnerability-in-Linux-XFRM-Subsystem/) [article] [CVE-2025-39965] [[trigger](https://github.com/Shreyas-Penkar/CVE-2025-39965)] |
| @@ -1242,6 +1264,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 1242 | 1264 | ||
| 1243 | [2020: "The never ending problems of local ASLR holes in Linux"](https://blog.blazeinfosec.com/the-never-ending-problems-of-local-aslr-holes-in-linux/) [article] [CVE-2019-11190] | 1265 | [2020: "The never ending problems of local ASLR holes in Linux"](https://blog.blazeinfosec.com/the-never-ending-problems-of-local-aslr-holes-in-linux/) [article] [CVE-2019-11190] |
| 1244 | 1266 | ||
| 1267 | [2019: "Binder Secctx Patch Analysis" by Jean-Baptiste Cayrou](https://www.synacktiv.com/publications/binder-secctx-patch-analysis.html) [article] [CVE-2019-2023] | ||
| 1268 | |||
| 1245 | [2019: "Reverse-engineering Broadcom wireless chipsets" by Hugues Anguelkov](https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html) [article] [CVE-2019-9503, CVE-2019-9500] | 1269 | [2019: "Reverse-engineering Broadcom wireless chipsets" by Hugues Anguelkov](https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html) [article] [CVE-2019-9503, CVE-2019-9500] |
| 1246 | 1270 | ||
| 1247 | [2019: "CVE-2019-2000 - Android kernel binder vulnerability analysis"](https://xz.aliyun.com/t/4494) [article] [CVE-2019-2000] | 1271 | [2019: "CVE-2019-2000 - Android kernel binder vulnerability analysis"](https://xz.aliyun.com/t/4494) [article] [CVE-2019-2000] |
| @@ -1261,6 +1285,10 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 1261 | 1285 | ||
| 1262 | ## Finding Bugs | 1286 | ## Finding Bugs |
| 1263 | 1287 | ||
| 1288 | [2026: "Reproducing a syzbot Bug in 5 Minutes — Now with virtme-ng!" by Roman Storozhenko](https://fosdem.org/2026/events/attachments/99ULYW-repro-linux-kernel-bug-5-min-virtme-ng/slides/267615/syzboot_flzqxsg.pdf) [slides] [[video](https://fosdem.org/2026/schedule/event/99ULYW-repro-linux-kernel-bug-5-min-virtme-ng/)] | ||
| 1289 | |||
| 1290 | [2025: "Head First Reporting of Linux Kernel CVEs: Practical Use of the Kernel Fuzzer" by Yunseong Kim](https://static.sched.com/hosted_files/sosscdjapan2024/7a/Head%20First%20Reporting%20of%20Linux%20Kernel%20CVEs%20-%20sosscj24.pdf) [slides] [[video](https://www.youtube.com/watch?v=DHpHvV7wYdA)] | ||
| 1291 | |||
| 1264 | [2025: "Build a Fake Phone, Find Real Bugs" by Romain Malmain](https://media.ccc.de/v/39c3-build-a-fake-phone-find-real-bugs-qualcomm-gpu-emulation-and-fuzzing-with-libafl-qemu) [video] [[code](https://github.com/rmalmain/39C3-build-a-fake-phone-find-real-bugs)] | 1292 | [2025: "Build a Fake Phone, Find Real Bugs" by Romain Malmain](https://media.ccc.de/v/39c3-build-a-fake-phone-find-real-bugs-qualcomm-gpu-emulation-and-fuzzing-with-libafl-qemu) [video] [[code](https://github.com/rmalmain/39C3-build-a-fake-phone-find-real-bugs)] |
| 1265 | 1293 | ||
| 1266 | [2025: "A Modular Approach To Power Management Fuzzing"](https://lpc.events/event/19/contributions/2087/attachments/1897/4063/PM_USB_LPC_25.pdf) [slides] [[video](https://www.youtube.com/watch?v=TNMcqQsqgr4)] | 1294 | [2025: "A Modular Approach To Power Management Fuzzing"](https://lpc.events/event/19/contributions/2087/attachments/1897/4063/PM_USB_LPC_25.pdf) [slides] [[video](https://www.youtube.com/watch?v=TNMcqQsqgr4)] |
| @@ -2015,6 +2043,8 @@ https://github.com/polygraphene/DirtyPipe-Android [CVE-2022-0847] | |||
| 2015 | 2043 | ||
| 2016 | https://github.com/SpiralBL0CK/CVE-2023-1206-CVE-2025-40040-CVE-2024-49882 | 2044 | https://github.com/SpiralBL0CK/CVE-2023-1206-CVE-2025-40040-CVE-2024-49882 |
| 2017 | 2045 | ||
| 2046 | https://github.com/kuzeyardabulut/CVE-2024-0582 | ||
| 2047 | |||
| 2018 | 2048 | ||
| 2019 | ## Tools | 2049 | ## Tools |
| 2020 | 2050 | ||
| @@ -2064,6 +2094,8 @@ https://github.com/worthdoingbadly/hid-parser-harness | |||
| 2064 | 2094 | ||
| 2065 | https://github.com/lkl/linux/pull/564 | 2095 | https://github.com/lkl/linux/pull/564 |
| 2066 | 2096 | ||
| 2097 | https://github.com/n132/slow-syzkall-locator [[article](https://n132.github.io/2025/12/20/Slow-Syzkalls-Locator.html)] | ||
| 2098 | |||
| 2067 | 2099 | ||
| 2068 | ### Assorted | 2100 | ### Assorted |
| 2069 | 2101 | ||
| @@ -2147,6 +2179,14 @@ https://github.com/bcoles/rootkit-signal-hunter | |||
| 2147 | 2179 | ||
| 2148 | https://github.com/mellow-hype/mt7622-qemu-vm | 2180 | https://github.com/mellow-hype/mt7622-qemu-vm |
| 2149 | 2181 | ||
| 2182 | https://github.com/angr/angrop/blob/master/examples/linux_escape_chain/solve.py | ||
| 2183 | |||
| 2184 | https://github.com/quic/crash-plugins | ||
| 2185 | |||
| 2186 | https://github.com/zolutal/kropr | ||
| 2187 | |||
| 2188 | https://github.com/MatheuZSecurity/ksentinel | ||
| 2189 | |||
| 2150 | 2190 | ||
| 2151 | ## Practice | 2191 | ## Practice |
| 2152 | 2192 | ||
| @@ -2175,6 +2215,8 @@ https://github.com/mellow-hype/mt7622-qemu-vm | |||
| 2175 | 2215 | ||
| 2176 | HackTheBox (knote): [writeup](https://pwning.tech/knote/) | 2216 | HackTheBox (knote): [writeup](https://pwning.tech/knote/) |
| 2177 | 2217 | ||
| 2218 | backdoor CTF 2025 (vibe-kode): [writeup](https://kqx.io/writeups/vibe_kode/) | ||
| 2219 | |||
| 2178 | WMCTF 2025 (wm_easyker): [writeup](https://blog.xmcve.com/2025/09/22/WMCTF2025-Writeup/#title-5) | 2220 | WMCTF 2025 (wm_easyker): [writeup](https://blog.xmcve.com/2025/09/22/WMCTF2025-Writeup/#title-5) |
| 2179 | 2221 | ||
| 2180 | STAR Labs Summer Pwnables 2025 (paradox_engine): [writeup](https://u1f383.github.io/linux/2025/09/01/starlabs-summer-pwnables-linux-kernel-challenge-writeup.html) | 2222 | STAR Labs Summer Pwnables 2025 (paradox_engine): [writeup](https://u1f383.github.io/linux/2025/09/01/starlabs-summer-pwnables-linux-kernel-challenge-writeup.html) |
| @@ -2199,16 +2241,22 @@ EuskalHack 2024 Gau-Hack: [writeup](https://gum3t.xyz/posts/a-gau-hack-from-eusk | |||
| 2199 | 2241 | ||
| 2200 | RWCTF 2024 (RIPTC): [source](https://github.com/chaitin/Real-World-CTF-6th-Challenges/tree/main/RIPTC), [writeup](https://aslr.io/2024/02/04/rwctf-6th-riptc-write-up/), [writeup 2](https://github.com/N1ghtu/RWCTF6th-RIPTC) | 2242 | RWCTF 2024 (RIPTC): [source](https://github.com/chaitin/Real-World-CTF-6th-Challenges/tree/main/RIPTC), [writeup](https://aslr.io/2024/02/04/rwctf-6th-riptc-write-up/), [writeup 2](https://github.com/N1ghtu/RWCTF6th-RIPTC) |
| 2201 | 2243 | ||
| 2244 | DownUnderCTF 2024 (Faulty Kernel): [writeup](https://n132.github.io/2024/07/18/Faulty-Kernel.html) | ||
| 2245 | |||
| 2202 | D^3CTF 2023 (d3kcache): [writeup](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/), [source](https://github.com/arttnba3/D3CTF2023_d3kcache) | 2246 | D^3CTF 2023 (d3kcache): [writeup](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/), [source](https://github.com/arttnba3/D3CTF2023_d3kcache) |
| 2203 | 2247 | ||
| 2204 | Imaginary CTF 2023 (Windows of Opportunity): [writeup 1](https://francescolucarini.github.io/Windows-of-Opportunity/), [writeup 2](https://ctftime.org/writeup/37670) | 2248 | Imaginary CTF 2023 (Windows of Opportunity): [writeup 1](https://francescolucarini.github.io/Windows-of-Opportunity/), [writeup 2](https://ctftime.org/writeup/37670) |
| 2205 | 2249 | ||
| 2206 | corCTF 2023 (sysruption): [writeup](https://www.willsroot.io/2023/08/sysruption.html) | 2250 | HITCON CTF 2023 (wall-rose): [writeup](https://n132.github.io/2024/09/29/rose.html) |
| 2251 | |||
| 2252 | corCTF 2023 (sysruption): [writeup](https://www.willsroot.io/2023/08/sysruption.html), [writeup 2](https://n132.github.io/2024/09/28/sysruption.html) | ||
| 2207 | 2253 | ||
| 2208 | corCTF 2023 (zeroday, kcipher): [writeup](https://blog.libh0ps.so/2023/08/02/corCTF2023.html) | 2254 | corCTF 2023 (zeroday, kcipher): [writeup](https://blog.libh0ps.so/2023/08/02/corCTF2023.html) |
| 2209 | 2255 | ||
| 2210 | corCTF 2023 (kcipher): [writeup](https://rockrid3r.github.io/2023/09/26/kcipher-writeup-corctf-2023.html) | 2256 | corCTF 2023 (kcipher): [writeup](https://rockrid3r.github.io/2023/09/26/kcipher-writeup-corctf-2023.html) |
| 2211 | 2257 | ||
| 2258 | corCTF 2022 (cache-of-castaways): [writeup](https://n132.github.io/2024/06/28/Castaways.html) | ||
| 2259 | |||
| 2212 | hxp CTF 2022 (one_byte): [writeup](https://hxp.io/blog/99/hxp-CTF-2022-one_byte-writeup/) | 2260 | hxp CTF 2022 (one_byte): [writeup](https://hxp.io/blog/99/hxp-CTF-2022-one_byte-writeup/) |
| 2213 | 2261 | ||
| 2214 | BFS Ekoparty 2022 (blunder): [writeup](https://klecko.github.io/posts/bfs-ekoparty-2022/) | 2262 | BFS Ekoparty 2022 (blunder): [writeup](https://klecko.github.io/posts/bfs-ekoparty-2022/) |
| @@ -2219,7 +2267,7 @@ zer0pts CTF 2022 (kRCE): [writeup](https://www.willsroot.io/2022/03/zer0pts-ctf- | |||
| 2219 | 2267 | ||
| 2220 | HITCON CTF 2022 (fourchain-kernel): [writeup and exploit](https://org.anize.rs/HITCON-2022/pwn/fourchain-kernel) | 2268 | HITCON CTF 2022 (fourchain-kernel): [writeup and exploit](https://org.anize.rs/HITCON-2022/pwn/fourchain-kernel) |
| 2221 | 2269 | ||
| 2222 | VULNCON CTF 2021 (IPS): [writeup](https://kileak.github.io/ctf/2021/vulncon-ips/), [writeup 2](https://blog.kylebot.net/2022/01/10/VULNCON-2021-IPS/) | 2270 | VULNCON CTF 2021 (IPS): [writeup](https://kileak.github.io/ctf/2021/vulncon-ips/), [writeup 2](https://blog.kylebot.net/2022/01/10/VULNCON-2021-IPS/), [writeup 3](https://n132.github.io/2024/02/09/IPS.html), [writeup 4](https://n132.github.io/2024/02/28/IPS-Freelist.html) |
| 2223 | 2271 | ||
| 2224 | N1 CTF 2021 (baby-guess): [source](https://github.com/sajjadium/ctf-archives/tree/main/N1CTF/2021/pwn/baby_guess), [writeup](https://kileak.github.io/ctf/2021/n1ctf21-babyguess/) | 2272 | N1 CTF 2021 (baby-guess): [source](https://github.com/sajjadium/ctf-archives/tree/main/N1CTF/2021/pwn/baby_guess), [writeup](https://kileak.github.io/ctf/2021/n1ctf21-babyguess/) |
| 2225 | 2273 | ||
| @@ -2233,7 +2281,7 @@ Midnightsun Quals 2021 (BroHammer): [writeup](https://www.willsroot.io/2021/04/m | |||
| 2233 | 2281 | ||
| 2234 | corCTF 2021 (fire-of-salvation): [source](https://github.com/Crusaders-of-Rust/corCTF-2021-public-challenge-archive/tree/main/pwn/fire-of-salvation), [writeup](https://www.willsroot.io/2021/08/corctf-2021-fire-of-salvation-writeup.html) | 2282 | corCTF 2021 (fire-of-salvation): [source](https://github.com/Crusaders-of-Rust/corCTF-2021-public-challenge-archive/tree/main/pwn/fire-of-salvation), [writeup](https://www.willsroot.io/2021/08/corctf-2021-fire-of-salvation-writeup.html) |
| 2235 | 2283 | ||
| 2236 | corCTF 2021 (wall-of-perdition): [source](https://github.com/Crusaders-of-Rust/corCTF-2021-public-challenge-archive/tree/main/pwn/wall-of-perdition), [writeup](https://syst3mfailure.io/wall-of-perdition) | 2284 | corCTF 2021 (wall-of-perdition): [source](https://github.com/Crusaders-of-Rust/corCTF-2021-public-challenge-archive/tree/main/pwn/wall-of-perdition), [writeup](https://syst3mfailure.io/wall-of-perdition), [writeup 2](https://n132.github.io/2024/05/27/Wall-of-Perdition.html) |
| 2237 | 2285 | ||
| 2238 | Google CTF 2021 (pwn-fullchain): [source](https://github.com/google/google-ctf/tree/master/2021/quals/pwn-fullchain), [writeup](https://ptr-yudai.hatenablog.com/entry/2021/07/26/225308) | 2286 | Google CTF 2021 (pwn-fullchain): [source](https://github.com/google/google-ctf/tree/master/2021/quals/pwn-fullchain), [writeup](https://ptr-yudai.hatenablog.com/entry/2021/07/26/225308) |
| 2239 | 2287 | ||
| @@ -2386,6 +2434,14 @@ https://github.com/0xor0ne/awesome-list/ | |||
| 2386 | 2434 | ||
| 2387 | ## Misc | 2435 | ## Misc |
| 2388 | 2436 | ||
| 2437 | [2026: "Hiding from the Panic Button: Singularity SysRq Hook" by MatheuZ](https://blog.kyntra.io/Hiding-from-the-Panic-Button-Singularity-SysRq-Hook) [article] | ||
| 2438 | |||
| 2439 | [2026: "Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools" by MatheuZ](https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking/) [article] | ||
| 2440 | |||
| 2441 | [2026: "Crushing Pwn2Own & H1 with Kernel Driver Exploits"](https://www.youtube.com/watch?v=pcAdNDK-lrs) [video] | ||
| 2442 | |||
| 2443 | [2025: "The Joys of Linux Kernel ROP Gadget Scanning" by Jennifer Miller](https://blog.zolutal.io/joys-of-kernel-rop/) [article] | ||
| 2444 | |||
| 2389 | [2025: "Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit" by MatheuZSec](https://blog.kyntra.io/Singularity-A-final-boss-linux-kernel-rootkit) [article] | 2445 | [2025: "Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit" by MatheuZSec](https://blog.kyntra.io/Singularity-A-final-boss-linux-kernel-rootkit) [article] |
| 2390 | 2446 | ||
| 2391 | [2025: "Exploiting a 13-years old bug on QEMU"](https://kqx.io/post/qemu-nday/) [article] | 2447 | [2025: "Exploiting a 13-years old bug on QEMU"](https://kqx.io/post/qemu-nday/) [article] |
| @@ -2496,6 +2552,8 @@ https://github.com/0xor0ne/awesome-list/ | |||
| 2496 | 2552 | ||
| 2497 | [2020: "Android / Linux SLUB aliasing for general- and special-purpose caches" by Vitaly Nikolenko](https://www.youtube.com/watch?v=5-eRsA0l8Pg) [video] | 2553 | [2020: "Android / Linux SLUB aliasing for general- and special-purpose caches" by Vitaly Nikolenko](https://www.youtube.com/watch?v=5-eRsA0l8Pg) [video] |
| 2498 | 2554 | ||
| 2555 | [2018: "Binder transactions in the bowels of the Linux Kernel" by Jean-Baptiste Cayrou](https://www.synacktiv.com/en/publications/binder-transactions-in-the-bowels-of-the-linux-kernel) [article] | ||
| 2556 | |||
| 2499 | [grsecurity CVE-Dataset](https://docs.google.com/spreadsheets/u/0/d/1JO43UfT7Vjun9ytSWNdI17xmnzZMg19Tii-rKw94Rvw/htmlview#gid=0) [spreadsheet] | 2557 | [grsecurity CVE-Dataset](https://docs.google.com/spreadsheets/u/0/d/1JO43UfT7Vjun9ytSWNdI17xmnzZMg19Tii-rKw94Rvw/htmlview#gid=0) [spreadsheet] |
| 2500 | 2558 | ||
| 2501 | [Syzkaller Coverage Dashboard](https://lookerstudio.google.com/reporting/41ae4a20-9826-4f7f-be14-a934a04686fe/page/4EOpD) | 2559 | [Syzkaller Coverage Dashboard](https://lookerstudio.google.com/reporting/41ae4a20-9826-4f7f-be14-a934a04686fe/page/4EOpD) |
