


Day 2: foundational exploitation techniques for memory corruptions.Ģ014: "Android Hacker's Handbook" by Joshua J.Day 1: introduction to KASAN and fuzzing (without syzkaller).


Trainingĭecember 5–6th: Attacking the Linux Kernel at Black Hat Europe 2022 in London. Subscribe to on Telegram, Twitter, or Reddit for highlights. Pull requests are welcome as well.įollow on Twitter to be notified of updates. A collection of links related to Linux kernel security and exploitation.
