kernelpop icon indicating copy to clipboard operation
kernelpop copied to clipboard

kernel privilege escalation enumeration and exploitation framework

Results 8 kernelpop issues
Sort by recently updated
recently updated
newest added

![image](https://user-images.githubusercontent.com/77216999/113795692-15bfdb80-9713-11eb-84b3-187276b9fd04.png)

![image](https://user-images.githubusercontent.com/77216999/113795407-726ec680-9712-11eb-8570-6a23fabfc12d.png)

https://github.com/bcoles/kernel-exploits/blob/master/CVE-2017-1000112/poc.c I'm maintaining an [updated exploit](https://github.com/bcoles/kernel-exploits/blob/cve-2017-1000112/CVE-2017-1000112/poc.c) in the `cve-2017-1000112` branch of my fork of xairy's exploit. I've added new offsets, new KASLR bypasses, support for other Ubuntu-based Linux distros (such...

https://github.com/bcoles/kernel-exploits/blob/master/CVE-2017-7308/poc.c I'm maintaining an [updated exploit](https://github.com/bcoles/kernel-exploits/blob/cve-2017-7308/CVE-2017-7308/poc.c) in the `cve-2017-7308` branch of my fork of xairy's exploit. I've added new offsets, new KASLR bypasses, additional pre-exploitation checks, and networking support for...

https://raw.githubusercontent.com/InteliSecureLabs/Linux_Exploit_Suggester/master/Linux_Exploit_Suggester.pl

Since kernelpop is written with python3, how is it supposed to work on redhat/centos distributions? e.g CentOS 6.3 Looks like py2installer is the only way around?

enhancement