diff options
| author | Andrey Konovalov | 2017-06-23 17:29:35 +0200 |
|---|---|---|
| committer | GitHub | 2017-06-23 17:29:35 +0200 |
| commit | ba4eda2c74628382f8e557fc839e068a418bf67a (patch) | |
| tree | 010d1d8241d005b64f083a07f637420a00a2521e /README.md | |
| parent | 40fd66e39a520929ae0d43654f8e0caa15bec7e6 (diff) | |
Update README.md
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 7 |
1 files changed, 5 insertions, 2 deletions
| @@ -5,6 +5,11 @@ Some exploitation methods and techniques are outdated and don't work anymore on | |||
| 5 | 5 | ||
| 6 | Pull requests are welcome. | 6 | Pull requests are welcome. |
| 7 | 7 | ||
| 8 | ## Books | ||
| 9 | |||
| 10 | [2012: "A Guide to Kernel Exploitation: Attacking the Core" by Enrico Perla and Massimiliano Oldani](https://github.com/sohaibnasser/CySecBooks/blob/master/A%20Guide%20to%20Kernel%20Exploitation%20Attacking%20the%20Core.pdf) | ||
| 11 | |||
| 12 | |||
| 8 | ## Exploitation techniques | 13 | ## Exploitation techniques |
| 9 | 14 | ||
| 10 | [2017: "New Reliable Android Kernel Root Exploitation Techniques"](http://powerofcommunity.net/poc2016/x82.pdf) [slides] | 15 | [2017: "New Reliable Android Kernel Root Exploitation Techniques"](http://powerofcommunity.net/poc2016/x82.pdf) [slides] |
| @@ -41,8 +46,6 @@ Pull requests are welcome. | |||
| 41 | 46 | ||
| 42 | [2012: "Attacking hardened Linux systems with kernel JIT spraying" by Keegan McAllister](https://mainisusuallyafunction.blogspot.ru/2012/11/attacking-hardened-linux-systems-with.html) [article] | 47 | [2012: "Attacking hardened Linux systems with kernel JIT spraying" by Keegan McAllister](https://mainisusuallyafunction.blogspot.ru/2012/11/attacking-hardened-linux-systems-with.html) [article] |
| 43 | 48 | ||
| 44 | [2012: "A Guide to Kernel Exploitation: Attacking the Core" by Enrico Perla and Massimiliano Oldani](https://www.pdf-archive.com/2011/02/24/a-guide-to-kernel-exploitation/a-guide-to-kernel-exploitation.pdf) [book] | ||
| 45 | |||
| 46 | [2012: "The Linux kernel memory allocators from an exploitation perspective" by Patroklos Argyroudis](https://argp.github.io/2012/01/03/linux-kernel-heap-exploitation/) [article] | 49 | [2012: "The Linux kernel memory allocators from an exploitation perspective" by Patroklos Argyroudis](https://argp.github.io/2012/01/03/linux-kernel-heap-exploitation/) [article] |
| 47 | 50 | ||
| 48 | [2011: "Stackjacking Your Way to grsec/PaX Bypass" by Jon Oberheide](https://jon.oberheide.org/blog/2011/04/20/stackjacking-your-way-to-grsec-pax-bypass/) [article] | 51 | [2011: "Stackjacking Your Way to grsec/PaX Bypass" by Jon Oberheide](https://jon.oberheide.org/blog/2011/04/20/stackjacking-your-way-to-grsec-pax-bypass/) [article] |
