{"id":15003909,"url":"https://github.com/lazenca/kernel-exploit-tech","last_synced_at":"2025-05-08T21:16:35.992Z","repository":{"id":45714357,"uuid":"183009711","full_name":"Lazenca/Kernel-exploit-tech","owner":"Lazenca","description":"Linux Kernel exploitation Tutorial.","archived":false,"fork":false,"pushed_at":"2020-06-30T02:27:38.000Z","size":3627,"stargazers_count":268,"open_issues_count":0,"forks_count":35,"subscribers_count":13,"default_branch":"master","last_synced_at":"2025-05-08T21:16:29.732Z","etag":null,"topics":["kernel-exploit","kernel-exploitation","linux-kernel","linux-kernel-hacking","tutorial-exercises","tutorials"],"latest_commit_sha":null,"homepage":"https://www.lazenca.net","language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Lazenca.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2019-04-23T12:25:46.000Z","updated_at":"2025-04-07T02:11:29.000Z","dependencies_parsed_at":"2022-09-10T18:02:37.161Z","dependency_job_id":null,"html_url":"https://github.com/Lazenca/Kernel-exploit-tech","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Lazenca%2FKernel-exploit-tech","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Lazenca%2FKernel-exploit-tech/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Lazenca%2FKernel-exploit-tech/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Lazenca%2FKernel-exploit-tech/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Lazenca","download_url":"https://codeload.github.com/Lazenca/Kernel-exploit-tech/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253149621,"owners_count":21861740,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["kernel-exploit","kernel-exploitation","linux-kernel","linux-kernel-hacking","tutorial-exercises","tutorials"],"created_at":"2024-09-24T19:00:37.431Z","updated_at":"2025-05-08T21:16:35.962Z","avatar_url":"https://github.com/Lazenca.png","language":"C","readme":"# Linux Kernel exploitation Tutorial.\nHi, I am Lazneca.0x0\n\nThese files are the example files used at \"https://www.lazenca.net/display/TEC/07.Linux+Kernel\". I hope that I will be able to use the text that I wrote and these files to help people who are new to Hacking's exploit technology to understand the technology a little easier.\n\nAll my writings are written in Korean. If someone can translate the contents on my site in English. Please help me.\n## Site\n* Web site : https://www.lazenca.net/\n* Facebook: https://www.facebook.com/Lazenca.0x0/\n## Basic exploit techniques.\n* [Basic exploit techniques](https://github.com/Lazenca/Exploit-tech)\n## Tutorial list\n### 01.Development of Kernel Module\n* [01.Hello world!](https://www.lazenca.net/pages/viewpage.action?pageId=23789735)\n* [02.Character Device Drivers](https://www.lazenca.net/display/TEC/02.Character+Device+Drivers)\n* [03.ioctl(Input/Output control)](https://www.lazenca.net/pages/viewpage.action?pageId=23789739)\n* [04.Creating a kernel module to privilege escalation](https://www.lazenca.net/display/TEC/04.Creating+a+kernel+module+to+privilege+escalation)\n### [02.Debugging kernel and modules](https://www.lazenca.net/display/TEC/02.Debugging+kernel+and+modules)\n### 03.Linux Kernel Exploitation Tutorial\n* [01.Stack smashing(32bit) \u0026 Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=23789706)\n* [02.Stack smashing(64bit) \u0026 Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624684)\n* [03.Stack smashing(64bit) \u0026 ROP](https://www.lazenca.net/pages/viewpage.action?pageId=25624746)\n* [04.Write-what-where(Arbitrary Memory Overwrite)(feat.ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624658)\n* [05.Null pointer dereference(32bit \u0026 64bit)](https://www.lazenca.net/pages/viewpage.action?pageId=25624632)\n* [06.Use-After-Free(UAF) (feat.struct cred)](https://www.lazenca.net/pages/viewpage.action?pageId=25624864)\n* [07.Use-After-Free(UAF) (feat.tty_struct)](https://www.lazenca.net/pages/viewpage.action?pageId=29327365)\n* [08.ret2dir(return-to-direct-mapped memory)](https://www.lazenca.net/pages/viewpage.action?pageId=25624881)\n### 04.Kernel Self-Protection\n* [01.Kernel Address Space Layout Randomization (KASLR)](https://www.lazenca.net/pages/viewpage.action?pageId=25624857)\n* [02.Segregation of kernel memory from userspace memory(x86's SMEP/SMAP, ARM's PXN/PAN)](https://www.lazenca.net/pages/viewpage.action?pageId=25624859)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flazenca%2Fkernel-exploit-tech","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Flazenca%2Fkernel-exploit-tech","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flazenca%2Fkernel-exploit-tech/lists"}