Research
the core papers i researched about kernel security.
Install / Use
/learn @cloudsec/ResearchREADME
research
The core papers i researched about kernel security.
Exploit linux kernel slub overflow. 2010
Kernel stack overflow with sub %%esp, it's different with stack buffer overflow. 2010
Exploit linux kernel stack buffer overflow on 2.6 kernels and slab overflow on 2.4 kernels. 2010
How to Exploit Linux Kernel NULL Pointer Dereference. 2010
CC_STACKPROTECTOR patch Analysis. 2010
Freebsd kernel heap exploitation. 2010
Bypass linux kernel module version check. 2010
Hack dev mem for fun. 2009
Advanced linux kernel inline hook implemention. 2009
linux kernel inline hook with copied opcode. 2009
Bypass firewall with netfilter. 2009
New way to hide files with LKM. 2008
Related Skills
proje
Interactive vocabulary learning platform with smart flashcards and spaced repetition for effective language acquisition.
YC-Killer
2.7kA library of enterprise-grade AI agents designed to democratize artificial intelligence and provide free, open-source alternatives to overvalued Y Combinator startups. If you are excited about democratizing AI access & AI agents, please star ⭐️ this repository and use the link in the readme to join our open source AI research team.
best-practices-researcher
The most comprehensive Claude Code skills registry | Web Search: https://skills-registry-web.vercel.app
groundhog
400Groundhog's primary purpose is to teach people how Cursor and all these other coding agents work under the hood. If you understand how these coding assistants work from first principles, then you can drive these tools harder (or perhaps make your own!).
Security Score
Audited on Dec 26, 2025
