Kernel

Explore 11 curated cybersecurity tools, with 14,884 visitors searching for solutions

Cyber Strategy Institute Warden Logo

Zero-trust kernel virtualization platform for endpoint defense and threat containment

0
Fibratus Logo

A modern tool for Windows kernel exploration and observability with a focus on security.

0
Linux Exploit Suggester (LES) Logo

A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.

0
HackSys Extreme Vulnerable Driver (HEVD) Logo

A Windows kernel driver intentionally designed with various vulnerabilities to help security researchers practice kernel exploitation techniques.

0
AuditD on Android Logo

Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.

0
AMExtractor Logo

AMExtractor is an Android memory acquisition tool that dumps physical device memory using /dev/kmem without requiring kernel source code.

0
Dirty COW Logo

A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.

0
Tracee eBPF Runtime Security Logo

Cutting-edge technology for developing security applications within the Linux kernel.

0
LinEnum Logo

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

0
Falco Logo

Falco is a CNCF graduated runtime security tool that monitors Linux kernel events and syscalls to detect abnormal behavior and security threats in cloud native environments.

0
Dirtyc0w Docker POC Logo

A proof-of-concept tool that demonstrates the Dirty COW kernel exploit (CVE-2016-5195) for privilege escalation within Docker containers, specifically targeting nginx images while providing mitigation guidance through AppArmor profiles.

0