0xedh / mistrastar-mips-exploitLinks
Mitrastar MIPS router analysis and exploitation
☆18Updated 4 years ago
Alternatives and similar repositories for mistrastar-mips-exploit
Users that are interested in mistrastar-mips-exploit are comparing it to the libraries listed below
Sorting:
- ☆128Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- MQTT exploit and Pentesting guide for penetration tester☆17Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- A collection of my public security advisories.☆27Updated 2 weeks ago
- ☆24Updated last year
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆20Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆134Updated 11 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- SSD Challenges☆48Updated 3 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆44Updated last month
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Write ups for Ph0wn CTF☆47Updated 2 months ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆22Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- A VS Code extension to preview XML nmap output☆44Updated 7 months ago
- ☆79Updated last year
- ☆55Updated last year
- Tools for offensive security of NetBackup infrastructures☆40Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A tool for firmware cartography☆160Updated 4 months ago
- A curated list of resources for the OSED journey.☆66Updated 3 years ago