0xdeadbeefJERKY / presentationsLinks
☆18Updated 6 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 8 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Break Apps with Frida workshop material☆46Updated 7 years ago
- Presentations☆10Updated 7 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Telco training☆26Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Updated 6 years ago
- ☆14Updated 6 years ago
- ☆43Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆46Updated 8 years ago
- ☆28Updated 7 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 7 years ago
- PoC code for CVE-2018-9539☆19Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- ☆31Updated 5 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- ☆45Updated 8 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- BSides Munich Frida Workshop 2018☆48Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 10 years ago
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- Curriculum Vitae European & Biography☆35Updated 2 years ago