shriyakk
shriyakk
github_runner@Ubuntu:~/Desktop/Rootkit/Umbra/kernel$ make make -C /lib/modules/5.15.0-56-generic/build M=/home/github_runner/Desktop/Rootkit/Umbra/kernel modules make[1]: Entering directory '/usr/src/linux-headers-5.15.0-56-generic' CC [M] /home/github_runner/Desktop/Rootkit/Umbra/kernel/src/ftrace_manager.o /home/github_runner/Desktop/Rootkit/Umbra/kernel/src/ftrace_manager.c: In function ‘install_hook’: /home/github_runner/Desktop/Rootkit/Umbra/kernel/src/ftrace_manager.c:38:20: error: assignment to ‘ftrace_func_t’ {aka ‘void (*)(long unsigned int, long unsigned...
Description - I have tried the exact same configuration as mentioned using test vm, but getting Call Trace and its stuck here - $ ./exploit [+] set/getxattr file created [+]...
Hi , Need your inputs on the issue - I have installed the dependencies and compiled the code. shriya@shriya-Standard-PC-Q35-ICH9-2009:~/Linux_LPE_io_uring_CVE-2021-41073/exploit$ ./exploit [+] set/getxattr file created [-] failed to load eBPF program!...
**Describe the bug** When reusable workflow is triggered on self hosted runner, the workflow suddenly fails with the Error message - The operation was canceled. The workflow was working fine...
test@test-ThinkCentre-M92p:~/Desktop/kernel-exploit-factory/CVE-2022-2588$ ./exploit [*] self path /home/test/Desktop/kernel-exploit-factory/CVE-2022-2588/./exploit [*] prepare evil data Old limits -> soft limit= 14096 hard limit= 14096 [*] starting exploit, num of cores: 4 [1] defragmentation - spray...