diff options
| author | Andrey Konovalov | 2018-07-16 20:33:56 +0200 |
|---|---|---|
| committer | GitHub | 2018-07-16 20:33:56 +0200 |
| commit | a795f943961c5c51da7b2d16948530918c8f0600 (patch) | |
| tree | 7725d2641c5a3347293f0ff3ced9426b9e9fe8f1 /README.md | |
| parent | 75eb25a88e805c1a504cee392768e8bcc438eedd (diff) | |
Update README.md
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 4 |
1 files changed, 4 insertions, 0 deletions
| @@ -90,6 +90,8 @@ Pull requests are welcome. | |||
| 90 | 90 | ||
| 91 | [2007: "The story of exploiting kmalloc() overflows"](http://www.ouah.org/kmallocstory.html) [article] | 91 | [2007: "The story of exploiting kmalloc() overflows"](http://www.ouah.org/kmallocstory.html) [article] |
| 92 | 92 | ||
| 93 | [2007: "Linux 2.6 Kernel Exploits" by Stephane Duverger](https://airbus-seclab.github.io/kernsploit/kernel_exploit_syscan07.pdf) [slides] | ||
| 94 | |||
| 93 | [2005, CancSecWest: "Large memory management vulnerabilities" by Gael Delalleau](https://cansecwest.com/core05/memory_vulns_delalleau.pdf) [slides] | 95 | [2005, CancSecWest: "Large memory management vulnerabilities" by Gael Delalleau](https://cansecwest.com/core05/memory_vulns_delalleau.pdf) [slides] |
| 94 | 96 | ||
| 95 | [2005: "The story of exploiting kmalloc() overflows"](https://argp.github.io/public/kmalloc_exploitation.pdf) [article] | 97 | [2005: "The story of exploiting kmalloc() overflows"](https://argp.github.io/public/kmalloc_exploitation.pdf) [article] |
| @@ -118,6 +120,8 @@ Pull requests are welcome. | |||
| 118 | 120 | ||
| 119 | [2018: "Ubuntu kernel eBPF 0day analysis"](https://security.tencent.com/index.php/blog/msg/124) [article, CVE-2017-16995] | 121 | [2018: "Ubuntu kernel eBPF 0day analysis"](https://security.tencent.com/index.php/blog/msg/124) [article, CVE-2017-16995] |
| 120 | 122 | ||
| 123 | [2018: "eBPF and Analysis of the get-rekt-linux-hardened.c Exploit for CVE-2017-16995"](https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html) [article, CVE-2017-16695] | ||
| 124 | |||
| 121 | [2017: "Adapting the POC for CVE-2017-1000112 to Other Kernels"](https://ricklarabee.blogspot.de/2017/12/adapting-poc-for-cve-2017-1000112-to.html) [article, CVE-2017-1000112] | 125 | [2017: "Adapting the POC for CVE-2017-1000112 to Other Kernels"](https://ricklarabee.blogspot.de/2017/12/adapting-poc-for-cve-2017-1000112-to.html) [article, CVE-2017-1000112] |
| 122 | 126 | ||
| 123 | [2017: "The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel" by Di Shen](https://speakerdeck.com/retme7/the-art-of-exploiting-unconventional-use-after-free-bugs-in-android-kernel) [slides, CVE-2017-0403, CVE-2016-6787] | 127 | [2017: "The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel" by Di Shen](https://speakerdeck.com/retme7/the-art-of-exploiting-unconventional-use-after-free-bugs-in-android-kernel) [slides, CVE-2017-0403, CVE-2016-6787] |
