#ret2usr

Linux Kernel Exploitation - ROP (part2)

Exploitation of a buffer overflow protected by SMEP, SMAP, KPTI. Use of Returned Oriented Programming in kernel land

Linux Kernel Exploitation - BOF (part1)

First exploitation of a buffer overflow flaw in a vulnerable device, explanation of the ret2usr technique + demonstration