kernelpop
kernelpop copied to clipboard
kernel privilege escalation enumeration and exploitation framework


https://github.com/bcoles/kernel-exploits/blob/master/CVE-2017-1000112/poc.c I'm maintaining an [updated exploit](https://github.com/bcoles/kernel-exploits/blob/cve-2017-1000112/CVE-2017-1000112/poc.c) in the `cve-2017-1000112` branch of my fork of xairy's exploit. I've added new offsets, new KASLR bypasses, support for other Ubuntu-based Linux distros (such...
https://github.com/bcoles/kernel-exploits/blob/master/CVE-2017-7308/poc.c I'm maintaining an [updated exploit](https://github.com/bcoles/kernel-exploits/blob/cve-2017-7308/CVE-2017-7308/poc.c) in the `cve-2017-7308` branch of my fork of xairy's exploit. I've added new offsets, new KASLR bypasses, additional pre-exploitation checks, and networking support for...
https://raw.githubusercontent.com/InteliSecureLabs/Linux_Exploit_Suggester/master/Linux_Exploit_Suggester.pl
Since kernelpop is written with python3, how is it supposed to work on redhat/centos distributions? e.g CentOS 6.3 Looks like py2installer is the only way around?
Signed-off-by: Gilad Oved