0xedh / mistrastar-mips-exploitLinks
Mitrastar MIPS router analysis and exploitation
☆17Updated 4 years ago
Alternatives and similar repositories for mistrastar-mips-exploit
Users that are interested in mistrastar-mips-exploit are comparing it to the libraries listed below
Sorting:
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- ☆125Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 weeks ago
- Write ups for Ph0wn CTF☆44Updated 2 weeks ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆21Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- A collection of statically-linked tools targeted to run on almost any linux system.☆31Updated 5 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- MQTT exploit and Pentesting guide for penetration tester☆16Updated last year
- ☆55Updated 10 months ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆21Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆169Updated 4 months ago
- SSD Challenges☆47Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆91Updated 3 years ago
- A tool for firmware cartography☆158Updated 2 months ago
- yet another hidden LKM hunter☆25Updated last year
- Linux rootkit for educational purposes☆33Updated last year
- Read Registry.pol files on Linux, or anywhere Python runs!☆16Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆116Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 8 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- A collection of my public security advisories.☆27Updated 4 months ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆44Updated last week
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 10 months ago
- ☆51Updated 6 years ago