0xedh / mistrastar-mips-exploit
Mitrastar MIPS router analysis and exploitation
☆15Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for mistrastar-mips-exploit
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 9 months ago
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆27Updated last month
- ☆49Updated last year
- Presentaciones de congresos☆51Updated 5 months ago
- Repository for slide decks of public talks I've given.☆14Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆44Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆12Updated 4 years ago
- Powershell Linter☆46Updated 2 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆14Updated 9 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Tools that trigger False Positive AV alerts☆43Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆59Updated last year
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆17Updated 3 years ago
- ☆45Updated 5 years ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆108Updated last month
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆12Updated 2 years ago
- An injector that use PT_LOAD technique☆11Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆17Updated 2 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Updated last year
- ☆24Updated 9 months ago
- DEFCON30 Talk Material, References and Extra Bits☆36Updated 2 years ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆31Updated 4 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated last year
- yet another hidden LKM hunter☆13Updated last year