diff options
Diffstat (limited to '')
| -rw-r--r-- | README.md | 83 |
1 files changed, 82 insertions, 1 deletions
| @@ -52,6 +52,12 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 52 | 52 | ||
| 53 | ### Exploitation | 53 | ### Exploitation |
| 54 | 54 | ||
| 55 | [2024: "PageJack: A Powerful Exploit Technique With Page-Level UAF" by Zhiyun Qian et. al](https://i.blackhat.com/BH-US-24/Presentations/US24-Qian-PageJack-A-Powerful-Exploit-Technique-With-Page-Level-UAF-Thursday.pdf) [slides] [[code](https://github.com/Lotuhu/Page-UAF)] [[summary](https://phrack.org/issues/71/13.html#article)] | ||
| 56 | |||
| 57 | [2024: "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel" by Lukas Maar et. al](https://stefangast.eu/papers/slubstick.pdf) [paper] | ||
| 58 | |||
| 59 | [2024: "Linux Kernel Exploitation - ret2usr" by Sascha Schirra](https://scoding.de/linux-kernel-exploitation-buffer_overflow) [article] | ||
| 60 | |||
| 55 | [2024: "Binary Exploitation Notes: Kernel" by Andrej Ljubic](https://ir0nstone.gitbook.io/notes/types/kernel) [articles] | 61 | [2024: "Binary Exploitation Notes: Kernel" by Andrej Ljubic](https://ir0nstone.gitbook.io/notes/types/kernel) [articles] |
| 56 | 62 | ||
| 57 | [2024: "Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation"](https://arxiv.org/pdf/2406.02624) [paper] | 63 | [2024: "Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation"](https://arxiv.org/pdf/2406.02624) [paper] |
| @@ -62,6 +68,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 62 | 68 | ||
| 63 | [2024: "Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems"](https://arxiv.org/pdf/2401.17618.pdf) [paper] | 69 | [2024: "Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems"](https://arxiv.org/pdf/2401.17618.pdf) [paper] |
| 64 | 70 | ||
| 71 | [2023: "Deep-Kernel Treasure Hunt: Finding exploitable structures in the Linux kernel" by Yudai Fujiwara](https://codeblue.jp/2023/result/pdf/cb23-deep-kernel-treasure-hunt-finding-exploitable-structures-in-the-linux-kernel-by-yudai-fujiwara.pdf) [slides] [[video](https://www.youtube.com/watch?v=mamm_23fHD4)] | ||
| 72 | |||
| 65 | [2023: "D^ 3CTF2023 d3kcache: From null-byte cross-cache overflow to infinite arbitrary read & write."](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/) [article] | 73 | [2023: "D^ 3CTF2023 d3kcache: From null-byte cross-cache overflow to infinite arbitrary read & write."](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/) [article] |
| 66 | 74 | ||
| 67 | [2023: "No Tux Given: Diving Into Contemporary Linux Kernel Exploitation" by sam4k](https://sam4k.com/content/files/2024/01/no_tux_given.pdf) [slides] | 75 | [2023: "No Tux Given: Diving Into Contemporary Linux Kernel Exploitation" by sam4k](https://sam4k.com/content/files/2024/01/no_tux_given.pdf) [slides] |
| @@ -273,6 +281,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 273 | 281 | ||
| 274 | ### Protection Bypasses | 282 | ### Protection Bypasses |
| 275 | 283 | ||
| 284 | [2024: "Leaking Host KASLR from Guest VMs Using Tagged TLB" by Reno Robert](https://pagedout.institute/download/PagedOut_004_beta1.pdf#page=58) [article] | ||
| 285 | |||
| 276 | [2024: "TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution" by Juhee Kim et al.](https://arxiv.org/pdf/2406.08719) [paper] [[code](https://github.com/compsec-snu/tiktag)] | 286 | [2024: "TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution" by Juhee Kim et al.](https://arxiv.org/pdf/2406.08719) [paper] [[code](https://github.com/compsec-snu/tiktag)] |
| 277 | 287 | ||
| 278 | [2023: "Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation"](https://download.vusec.net/papers/slam_sp24.pdf) [paper] | 288 | [2023: "Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation"](https://download.vusec.net/papers/slam_sp24.pdf) [paper] |
| @@ -406,6 +416,30 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 406 | 416 | ||
| 407 | ### LPE | 417 | ### LPE |
| 408 | 418 | ||
| 419 | [2024: "Google: Security Research: CVE-2024-26581](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation/docs) [article] [CVE-2024-26581] | ||
| 420 | |||
| 421 | [2024: "Race conditions in Linux Kernel perf events"](https://binarygecko.com/race-conditions-in-linux-kernel-perf-events/) [[code](https://github.com/Binary-Gecko/perf_PoC)] [CVE-UNKNOWN] | ||
| 422 | |||
| 423 | [2024: "CVE-2020-27786 (Race Condition + Use-After-Free)" by ii4gsp](https://ii4gsp.github.io/cve-2020-27786/) [article] [CVE-2020-27786] | ||
| 424 | |||
| 425 | [2024: "GPUAF Using a general GPU exploit tech to attack Pixel8" by Pan Zhenpeng and Jheng Bing Jhong](https://www.youtube.com/watch?v=Mw6iCqjOV9Q) [video] [CVE-UNKNOWN] | ||
| 426 | |||
| 427 | [2024: "Linux Kernel taprio OOB"](https://ssd-disclosure.com/ssd-advisory-linux-kernel-taprio-oob/) [article] [CVE-2024-36974] | ||
| 428 | |||
| 429 | [2024: "CVE-2022-22265 Samsung npu driver" by Javier P Rufo](https://soez.github.io/posts/CVE-2022-22265-Samsung-npu-driver/) [article] [CVE-2022-22265] | ||
| 430 | |||
| 431 | [2024: "The Way to Android Root: Exploiting Your GPU On Smartphone" by Xiling Gong, Xuan Xing, and Eugene Rodionov](https://i.blackhat.com/BH-US-24/Presentations/REVISED02-US24-Gong-The-Way-to-Android-Root-Wednesday.pdf) [slides] [CVE-2024-23380] | ||
| 432 | |||
| 433 | [2024: "A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability" by Juan Jose Lopez Jaimez and Meador Inge](https://bughunters.google.com/blog/6303226026131456/a-deep-dive-into-cve-2023-2163-how-we-found-and-fixed-an-ebpf-linux-kernel-vulnerability) [article] [CVE-2023-2163] | ||
| 434 | |||
| 435 | [2024: "Vulnerability in the eBPF verifier register limit tracking" by Juan Jose Lopez Jaimez](https://github.com/google/security-research/security/advisories/GHSA-hfqc-63c7-rj9f) [CVE-2024-41003] | ||
| 436 | |||
| 437 | [2024: "Android Binder Attack Matrix" by Utkarsh](https://utkarshcodes.medium.com/android-binder-attack-matrix-introduction-450d31d1d951) [article] | ||
| 438 | [[part 2](https://utkarshcodes.medium.com/android-binder-attack-matrix-cve-2023-20938-cve-2023-21255-uaf-details-article-1-4cc2eb3919f9)] | ||
| 439 | [[part 3](https://utkarshcodes.medium.com/android-binder-attack-matrix-exploitation-of-cve-2023-20938-article-2-6215160e3373)] | ||
| 440 | [[part 4](https://utkarshcodes.medium.com/android-binder-attack-matrix-fuzzing-binder-with-linux-kernel-library-lkl-article-3-62e931161eb5)] | ||
| 441 | [[part 5](https://utkarshcodes.medium.com/android-binder-attack-matrix-results-conclusion-d7143057408f)] | ||
| 442 | |||
| 409 | [2024: "Driving forward in Android drivers" by Seth Jenkins](https://googleprojectzero.blogspot.com/2024/06/driving-forward-in-android-drivers.html) [article] [[video](https://archive.org/details/shmoocon2024/Shmoocon2024-SethJenkins-Driving_Forward_in_Android_Drivers.mp4)] [CVE-2023-32837] [CVE-2023-32832] | 443 | [2024: "Driving forward in Android drivers" by Seth Jenkins](https://googleprojectzero.blogspot.com/2024/06/driving-forward-in-android-drivers.html) [article] [[video](https://archive.org/details/shmoocon2024/Shmoocon2024-SethJenkins-Driving_Forward_in_Android_Drivers.mp4)] [CVE-2023-32837] [CVE-2023-32832] |
| 410 | 444 | ||
| 411 | [2024: "Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938" by Eugene Rodionov, Zi Fan Tan, and Gulshan Singh](https://androidoffsec.withgoogle.com/posts/attacking-android-binder-analysis-and-exploitation-of-cve-2023-20938/) [article] [CVE-2023-20938] | 445 | [2024: "Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938" by Eugene Rodionov, Zi Fan Tan, and Gulshan Singh](https://androidoffsec.withgoogle.com/posts/attacking-android-binder-analysis-and-exploitation-of-cve-2023-20938/) [article] [CVE-2023-20938] |
| @@ -414,7 +448,7 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 414 | 448 | ||
| 415 | [2024: "Linux Kernel nft_validate_register_store Integer Overflow Privilege Escalation"](https://ssd-disclosure.com/ssd-advisory-linux-kernel-nft_validate_register_store-integer-overflow-privilege-escalation/) [article] [CVE-UNKNOWN] | 449 | [2024: "Linux Kernel nft_validate_register_store Integer Overflow Privilege Escalation"](https://ssd-disclosure.com/ssd-advisory-linux-kernel-nft_validate_register_store-integer-overflow-privilege-escalation/) [article] [CVE-UNKNOWN] |
| 416 | 450 | ||
| 417 | [2024: "Game of Cross Cache: Let's win it in a more effective way!" by Le Wu](https://i.blackhat.com/Asia-24/Presentations/Asia-24-Wu-Game-of-Cross-Cache.pdf) [slides] [CVE-2023-21400] | 451 | [2024: "Game of Cross Cache: Let's win it in a more effective way!" by Le Wu](https://i.blackhat.com/Asia-24/Presentations/Asia-24-Wu-Game-of-Cross-Cache.pdf) [slides] [[video](https://www.youtube.com/watch?v=em9qgHm3uIk)] [CVE-2023-21400] |
| 418 | 452 | ||
| 419 | [2024: "LinkDoor: A Hidden Attack Surface in the Android Netlink Kernel Modules" by Chao Ma et al.](https://i.blackhat.com/Asia-24/Presentations/Asia-24-Ma-LinkDoor-A-Hidden-Attack.pdf) [slides] [CVE-2023-32878] [CVE-2023-32882] | 453 | [2024: "LinkDoor: A Hidden Attack Surface in the Android Netlink Kernel Modules" by Chao Ma et al.](https://i.blackhat.com/Asia-24/Presentations/Asia-24-Ma-LinkDoor-A-Hidden-Attack.pdf) [slides] [CVE-2023-32878] [CVE-2023-32882] |
| 420 | 454 | ||
| @@ -877,6 +911,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 877 | 911 | ||
| 878 | ### RCE | 912 | ### RCE |
| 879 | 913 | ||
| 914 | [2024: "Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap" by Robert Herrera and Alex Plaskett](https://www.nccgroup.com/media/uzbp3ttw/bhus24_sonos_whitepaper.pdf) [article] [[slides](https://i.blackhat.com/BH-US-24/Presentations/US-24-Herrera-Listen-Up-Sonos-Over-The-Air-Exploitation-and-Covert-Wiretap-Thursday.pdf)] [CVE-2023-50809] [CVE-2024-20018] | ||
| 915 | |||
| 880 | [2023: "Abusing Linux In-Kernel SMB Server to Gain Kernel Remote Code Execution" by Guillaume Teissier and Quentin Minster](https://www.youtube.com/watch?v=XT6jLBbzwFM) [video] [CVE-2022-47943] [CVE-2023-2593] | 916 | [2023: "Abusing Linux In-Kernel SMB Server to Gain Kernel Remote Code Execution" by Guillaume Teissier and Quentin Minster](https://www.youtube.com/watch?v=XT6jLBbzwFM) [video] [CVE-2022-47943] [CVE-2023-2593] |
| 881 | 917 | ||
| 882 | [2022: "Writing a Linux Kernel Remote in 2022" by Samuel Page](https://blog.immunityinc.com/p/writing-a-linux-kernel-remote-in-2022/) [article] [[slides](https://conference.hitb.org/hitbsecconf2022sin/materials/D1T1%20-%20Erybody%20Gettin%20TIPC%20-%20Demystifying%20Remote%20Linux%20Kernel%20Exploitation%20-%20Sam%20Page.pdf)] [CVE-2022-0435] | 918 | [2022: "Writing a Linux Kernel Remote in 2022" by Samuel Page](https://blog.immunityinc.com/p/writing-a-linux-kernel-remote-in-2022/) [article] [[slides](https://conference.hitb.org/hitbsecconf2022sin/materials/D1T1%20-%20Erybody%20Gettin%20TIPC%20-%20Demystifying%20Remote%20Linux%20Kernel%20Exploitation%20-%20Sam%20Page.pdf)] [CVE-2022-0435] |
| @@ -898,6 +934,10 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 898 | 934 | ||
| 899 | ### Other | 935 | ### Other |
| 900 | 936 | ||
| 937 | [2024: "Deep Dive into RCU Race Condition: Analysis of TCP-AO UAF (CVE-2024–27394)"](https://blog.theori.io/deep-dive-into-rcu-race-condition-analysis-of-tcp-ao-uaf-cve-2024-27394-f40508b84c42) [article] [CVE-2024–27394] | ||
| 938 | |||
| 939 | [2024: "ZDI-24-821: A Remote UAF in The Kernel's net/tipc" by Sam Page](https://sam4k.com/zdi-24-821-a-remote-use-after-free-in-the-kernels-net-tipc/) [article] [ZDI-24-821] [CVE-2024-36886] | ||
| 940 | |||
| 901 | [2024: "Race condition in 9p file system"](https://r00tkitsmm.github.io/fuzzing/2024/05/29/Race-into-9p.html) [article] | 941 | [2024: "Race condition in 9p file system"](https://r00tkitsmm.github.io/fuzzing/2024/05/29/Race-into-9p.html) [article] |
| 902 | 942 | ||
| 903 | [2024: "Notes about ZDI-24-195 in ksmbd"](https://twitter.com/Shiftreduce/status/1773385937893896206) [thread] [ZDI-24-195] | 943 | [2024: "Notes about ZDI-24-195 in ksmbd"](https://twitter.com/Shiftreduce/status/1773385937893896206) [thread] [ZDI-24-195] |
| @@ -979,6 +1019,10 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 979 | 1019 | ||
| 980 | ## Finding Bugs | 1020 | ## Finding Bugs |
| 981 | 1021 | ||
| 1022 | [2024: "StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing" by Bodong Zhao et. al](https://github.com/vul337/StateFuzz/blob/main/statefuzz.pdf) [paper] [[code](https://github.com/vul337/StateFuzz)] | ||
| 1023 | |||
| 1024 | [2024: "BRF: eBPF Runtime Fuzzer" by Hsin-Wei Hung and Ardalan Amiri Sani](https://arxiv.org/pdf/2305.08782) [paper] | ||
| 1025 | |||
| 982 | [2024: "So You Wanna Find Bugs In The Linux Kernel?" by Sam Page](https://github.com/sam4k/talk-slides/blob/main/so_you_wanna_find_bugs_in_the_linux_kernel.pdf) [slides] | 1026 | [2024: "So You Wanna Find Bugs In The Linux Kernel?" by Sam Page](https://github.com/sam4k/talk-slides/blob/main/so_you_wanna_find_bugs_in_the_linux_kernel.pdf) [slides] |
| 983 | 1027 | ||
| 984 | [2024: "A bug hunter's reflections on fuzzing" by Alexander Popov](https://a13xp0p0v.github.io/img/Alexander_Popov-Reflections_on_Fuzzing.pdf) [slides] [[video](https://www.youtube.com/watch?v=wTbFmdx7wG8)] | 1028 | [2024: "A bug hunter's reflections on fuzzing" by Alexander Popov](https://a13xp0p0v.github.io/img/Alexander_Popov-Reflections_on_Fuzzing.pdf) [slides] [[video](https://www.youtube.com/watch?v=wTbFmdx7wG8)] |
| @@ -997,6 +1041,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 997 | 1041 | ||
| 998 | [2024: "SyzRetrospector: A Large-Scale Retrospective Study of Syzbot"](https://arxiv.org/pdf/2401.11642.pdf) [paper] | 1042 | [2024: "SyzRetrospector: A Large-Scale Retrospective Study of Syzbot"](https://arxiv.org/pdf/2401.11642.pdf) [paper] |
| 999 | 1043 | ||
| 1044 | [2023: "ReUSB: Replay-Guided USB Driver Fuzzing" by Jisoo Jang, Minsuk Kang, and Dokyung Song](https://www.usenix.org/system/files/usenixsecurity23-jang.pdf) [paper] [[slides](https://www.usenix.org/system/files/sec23_slides_jang-jisoo.pdf)] [[video](https://www.youtube.com/watch?v=DjD2-gbuXBo)] | ||
| 1045 | |||
| 1000 | [2023: "KernelGPT: Enhanced Kernel Fuzzing via Large Language Models"](https://arxiv.org/pdf/2401.00563.pdf) [paper] | 1046 | [2023: "KernelGPT: Enhanced Kernel Fuzzing via Large Language Models"](https://arxiv.org/pdf/2401.00563.pdf) [paper] |
| 1001 | 1047 | ||
| 1002 | [2023: "SyzDirect: Directed Greybox Fuzzing for Linux Kernel"](https://yuanxzhang.github.io/paper/syzdirect-ccs23.pdf) [paper] | 1048 | [2023: "SyzDirect: Directed Greybox Fuzzing for Linux Kernel"](https://yuanxzhang.github.io/paper/syzdirect-ccs23.pdf) [paper] |
| @@ -1256,6 +1302,14 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 1256 | 1302 | ||
| 1257 | ["Linux Kernel Defence Map" by Alexander Popov](https://github.com/a13xp0p0v/linux-kernel-defence-map) | 1303 | ["Linux Kernel Defence Map" by Alexander Popov](https://github.com/a13xp0p0v/linux-kernel-defence-map) |
| 1258 | 1304 | ||
| 1305 | [2024: "Reducing Maintenance Burden by Bending C" by Mathias Krause](https://grsecurity.net/reducing_maintenance_burden_by_bending_c) [article] | ||
| 1306 | |||
| 1307 | [2024: "BeeBox: Hardening BPF against Transient Execution Attacks" by Di Jin, Alexander J. Gaidis, and Vasileios P. Kemerlis](https://cs.brown.edu/~vpk/papers/beebox.sec24.pdf) [paper] [[code](https://gitlab.com/brown-ssl/beebox)] | ||
| 1308 | |||
| 1309 | [2024: "Validating the eBPF Verifier via State Embedding" by Hao Sun and Zhendong Su](https://www.usenix.org/system/files/osdi24-sun-hao.pdf) [paper] | ||
| 1310 | |||
| 1311 | [2024: "Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI" by Lukas Maar et. al](https://dl.acm.org/doi/pdf/10.1145/3634737.3661135) [paper] | ||
| 1312 | |||
| 1259 | [2024: "On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead)" by Davide Davoli et al.](https://arxiv.org/pdf/2406.07278) [paper] | 1313 | [2024: "On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead)" by Davide Davoli et al.](https://arxiv.org/pdf/2406.07278) [paper] |
| 1260 | 1314 | ||
| 1261 | [2024: "Challenges and innovations towards safer flexible arrays in the Linux Kernel" by Gustavo A. R. Silva](https://embeddedor.com/slides/2024/llc/llc2024.pdf) [slides] | 1315 | [2024: "Challenges and innovations towards safer flexible arrays in the Linux Kernel" by Gustavo A. R. Silva](https://embeddedor.com/slides/2024/llc/llc2024.pdf) [slides] |
| @@ -1447,6 +1501,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 1447 | 1501 | ||
| 1448 | [Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id) | 1502 | [Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id) |
| 1449 | 1503 | ||
| 1504 | [Google kernelCTF writeups and exploits](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf) | ||
| 1505 | |||
| 1450 | https://github.com/bsauce/kernel-exploit-factory | 1506 | https://github.com/bsauce/kernel-exploit-factory |
| 1451 | 1507 | ||
| 1452 | https://www.exploit-db.com/search/?action=search&description=linux+kernel | 1508 | https://www.exploit-db.com/search/?action=search&description=linux+kernel |
| @@ -1567,6 +1623,10 @@ https://github.com/roddux/germy | |||
| 1567 | 1623 | ||
| 1568 | https://github.com/renorobert/tagbleedvmm | 1624 | https://github.com/renorobert/tagbleedvmm |
| 1569 | 1625 | ||
| 1626 | https://github.com/roddux/ixode | ||
| 1627 | |||
| 1628 | https://github.com/b17fr13nds/kernel-exploits | ||
| 1629 | |||
| 1570 | 1630 | ||
| 1571 | ## Tools | 1631 | ## Tools |
| 1572 | 1632 | ||
| @@ -1610,6 +1670,8 @@ https://github.com/google/buzzer | |||
| 1610 | 1670 | ||
| 1611 | https://github.com/h0mbre/Lucid | 1671 | https://github.com/h0mbre/Lucid |
| 1612 | 1672 | ||
| 1673 | https://github.com/b17fr13nds/lxfuzz [[notes](https://b17fr13nds.github.io/posts/kernel_fuzzer_lxfuzz/)] | ||
| 1674 | |||
| 1613 | 1675 | ||
| 1614 | ### Assorted | 1676 | ### Assorted |
| 1615 | 1677 | ||
| @@ -1683,6 +1745,7 @@ https://github.com/gsingh93/linux-exploit-dev-env | |||
| 1683 | 1745 | ||
| 1684 | https://github.com/NUS-Curiosity/KernJC | 1746 | https://github.com/NUS-Curiosity/KernJC |
| 1685 | 1747 | ||
| 1748 | |||
| 1686 | ## Practice | 1749 | ## Practice |
| 1687 | 1750 | ||
| 1688 | ### Workshops | 1751 | ### Workshops |
| @@ -1702,8 +1765,16 @@ https://github.com/NUS-Curiosity/KernJC | |||
| 1702 | 1765 | ||
| 1703 | [github.com/AravGarg/kernel-hacking/ctf-challs](https://github.com/AravGarg/kernel-hacking/tree/master/ctf-challs) | 1766 | [github.com/AravGarg/kernel-hacking/ctf-challs](https://github.com/AravGarg/kernel-hacking/tree/master/ctf-challs) |
| 1704 | 1767 | ||
| 1768 | [FrancescoLucarini/Linux-Kernel-CTF-exploits](https://github.com/FrancescoLucarini/Linux-Kernel-CTF-exploits) | ||
| 1769 | |||
| 1770 | [mephi42/ctf](https://github.com/mephi42/ctf) | ||
| 1771 | |||
| 1705 | HackTheBox (knote): [writeup](https://pwning.tech/knote/) | 1772 | HackTheBox (knote): [writeup](https://pwning.tech/knote/) |
| 1706 | 1773 | ||
| 1774 | HITCON CTF QUAL 2024 (Halloween): [writeup](https://u1f383.github.io/ctf/2024/07/16/hitcon-ctf-qual-2024-pwn-challenge-part-1-halloween-and-v8sbx.html) | ||
| 1775 | |||
| 1776 | EuskalHack 2024 Gau-Hack: [writeup](https://gum3t.xyz/posts/a-gau-hack-from-euskalhack/) | ||
| 1777 | |||
| 1707 | RWCTF 2024 (RIPTC): [source](https://github.com/chaitin/Real-World-CTF-6th-Challenges/tree/main/RIPTC), [writeup](https://aslr.io/2024/02/04/rwctf-6th-riptc-write-up/), [writeup 2](https://github.com/N1ghtu/RWCTF6th-RIPTC) | 1778 | RWCTF 2024 (RIPTC): [source](https://github.com/chaitin/Real-World-CTF-6th-Challenges/tree/main/RIPTC), [writeup](https://aslr.io/2024/02/04/rwctf-6th-riptc-write-up/), [writeup 2](https://github.com/N1ghtu/RWCTF6th-RIPTC) |
| 1708 | 1779 | ||
| 1709 | D^3CTF 2023 (d3kcache): [writeup](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/), [source](https://github.com/arttnba3/D3CTF2023_d3kcache) | 1780 | D^3CTF 2023 (d3kcache): [writeup](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/), [source](https://github.com/arttnba3/D3CTF2023_d3kcache) |
| @@ -1889,6 +1960,14 @@ https://github.com/0xor0ne/awesome-list/ | |||
| 1889 | 1960 | ||
| 1890 | ## Misc | 1961 | ## Misc |
| 1891 | 1962 | ||
| 1963 | [2024: "Love and hate - The cyber tale between fuzzer and exploits in Linux kernel" by Zou Xiaochen](https://www.youtube.com/watch?v=cDcMlMH-XjU) [video] | ||
| 1964 | |||
| 1965 | [2024: "Reflections on RANDSTRUCT in GrapheneOS" by Julien Voisin](https://dustri.org/b/reflections-on-randstruct-in-grapheneos.html) [article] | ||
| 1966 | |||
| 1967 | [2024: "Linux Kernel Security Process or Why are there so many kernel CVEs now?” by Greg Kroah-Hartman](https://static.sched.com/hosted_files/kccncossaidevchn2024/17/security-stuff.pdf) [slides] | ||
| 1968 | |||
| 1969 | [2024: "Who opened this big hole in the Linux kernel?"](https://mp.weixin.qq.com/s/Sr4qIy-AdLhpkus6q1su9w) [article] | ||
| 1970 | |||
| 1892 | [2024: "KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities"](https://arxiv.org/pdf/2404.11107) [paper] | 1971 | [2024: "KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities"](https://arxiv.org/pdf/2404.11107) [paper] |
| 1893 | 1972 | ||
| 1894 | [2024: "silent syscall hooking on arm64 linux via patching svc handler"](https://tmpout.sh/3/23.html) [article] | 1973 | [2024: "silent syscall hooking on arm64 linux via patching svc handler"](https://tmpout.sh/3/23.html) [article] |
| @@ -1984,3 +2063,5 @@ https://twitter.com/sirdarckcat/status/1681924752800366592 | |||
| 1984 | https://github.com/hardenedvault/ved-ebpf | 2063 | https://github.com/hardenedvault/ved-ebpf |
| 1985 | 2064 | ||
| 1986 | https://github.com/thebabush/linux-russian-roulette | 2065 | https://github.com/thebabush/linux-russian-roulette |
| 2066 | |||
| 2067 | https://kspp.github.io/ | ||
