0xedh / mistrastar-mips-exploit
Mitrastar MIPS router analysis and exploitation
☆15Updated 3 years ago
Related projects: ⓘ
- This repositery contains the slides, sometimes videos, and materials of my talks.☆25Updated last month
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 7 months ago
- Leveraging patch diffing to discover new vulnerabilities☆101Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆55Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Tools that trigger False Positive AV alerts☆42Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆48Updated 11 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆80Updated 4 months ago
- ysoserial.net docker image☆27Updated 7 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆25Updated last month
- Ansible build for Afl++ Frida-Mode☆20Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆103Updated 6 months ago
- Check robustness of your (their) Active Directory accounts passwords☆32Updated 6 months ago
- Powershell Linter☆46Updated 2 months ago
- QuoteDB (Vulnerable TCP Server)☆58Updated 9 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆47Updated last year
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆25Updated last year
- Windows internals and exploitation tricks☆90Updated 3 months ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆29Updated 2 months ago
- HN Security's advisories.☆20Updated 3 months ago
- SecurityBsides Roma Conference Repo☆10Updated last year
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆38Updated last year
- ☆44Updated 5 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated 10 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆118Updated 2 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆12Updated 7 months ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆19Updated 3 years ago