A tool for inferring the Linux kernel base address and physical memory layout as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
-
Updated
Apr 20, 2026 - C
A tool for inferring the Linux kernel base address and physical memory layout as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
Kernel-mode research tool that demonstrates how Windows DWM enforces WDA_EXCLUDEFROMCAPTURE by directly calling the undocumented win32kfull!GreProtectSpriteContent function. A proof-of-concept for understanding the user/kernel boundary in screen capture protection mechanisms.
Kernsec is quick & dirty script to print kernel protections, useful informations of kernel exploitation/pwn in Kernel Land
Explore kernel-level window capture protection on Windows by demonstrating how DWM enforces exclusion from screen capture APIs.
Add a description, image, and links to the kaslr topic page so that developers can more easily learn about it.
To associate your repository with the kaslr topic, visit your repo's landing page and select "manage topics."