diff options
| -rw-r--r-- | README.md | 7 |
1 files changed, 5 insertions, 2 deletions
| @@ -5,6 +5,11 @@ Some exploitation methods and techniques are outdated and don't work anymore on | |||
| 5 | 5 | ||
| 6 | Pull requests are welcome. | 6 | Pull requests are welcome. |
| 7 | 7 | ||
| 8 | ## Books | ||
| 9 | |||
| 10 | [2012: "A Guide to Kernel Exploitation: Attacking the Core" by Enrico Perla and Massimiliano Oldani](https://github.com/sohaibnasser/CySecBooks/blob/master/A%20Guide%20to%20Kernel%20Exploitation%20Attacking%20the%20Core.pdf) | ||
| 11 | |||
| 12 | |||
| 8 | ## Exploitation techniques | 13 | ## Exploitation techniques |
| 9 | 14 | ||
| 10 | [2017: "New Reliable Android Kernel Root Exploitation Techniques"](http://powerofcommunity.net/poc2016/x82.pdf) [slides] | 15 | [2017: "New Reliable Android Kernel Root Exploitation Techniques"](http://powerofcommunity.net/poc2016/x82.pdf) [slides] |
| @@ -41,8 +46,6 @@ Pull requests are welcome. | |||
| 41 | 46 | ||
| 42 | [2012: "Attacking hardened Linux systems with kernel JIT spraying" by Keegan McAllister](https://mainisusuallyafunction.blogspot.ru/2012/11/attacking-hardened-linux-systems-with.html) [article] | 47 | [2012: "Attacking hardened Linux systems with kernel JIT spraying" by Keegan McAllister](https://mainisusuallyafunction.blogspot.ru/2012/11/attacking-hardened-linux-systems-with.html) [article] |
| 43 | 48 | ||
| 44 | [2012: "A Guide to Kernel Exploitation: Attacking the Core" by Enrico Perla and Massimiliano Oldani](https://www.pdf-archive.com/2011/02/24/a-guide-to-kernel-exploitation/a-guide-to-kernel-exploitation.pdf) [book] | ||
| 45 | |||
| 46 | [2012: "The Linux kernel memory allocators from an exploitation perspective" by Patroklos Argyroudis](https://argp.github.io/2012/01/03/linux-kernel-heap-exploitation/) [article] | 49 | [2012: "The Linux kernel memory allocators from an exploitation perspective" by Patroklos Argyroudis](https://argp.github.io/2012/01/03/linux-kernel-heap-exploitation/) [article] |
| 47 | 50 | ||
| 48 | [2011: "Stackjacking Your Way to grsec/PaX Bypass" by Jon Oberheide](https://jon.oberheide.org/blog/2011/04/20/stackjacking-your-way-to-grsec-pax-bypass/) [article] | 51 | [2011: "Stackjacking Your Way to grsec/PaX Bypass" by Jon Oberheide](https://jon.oberheide.org/blog/2011/04/20/stackjacking-your-way-to-grsec-pax-bypass/) [article] |
