0xedh / mistrastar-mips-exploit
Mitrastar MIPS router analysis and exploitation
☆15Updated 3 years ago
Alternatives and similar repositories for mistrastar-mips-exploit:
Users that are interested in mistrastar-mips-exploit are comparing it to the libraries listed below
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ☆24Updated last year
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆14Updated last year
- Ansible build for Afl++ Frida-Mode☆23Updated 8 months ago
- Leveraging patch diffing to discover new vulnerabilities☆111Updated 4 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- A VS Code extension to preview XML nmap output☆44Updated this week
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- frown (frida-own) – an instrumentation challenge☆24Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆45Updated 3 years ago
- BINARLY Research Tools and PoCs☆35Updated 4 months ago
- ☆58Updated 11 months ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Presentaciones de congresos☆52Updated 8 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆44Updated 8 months ago
- Tools that trigger False Positive AV alerts☆44Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- ☆24Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆51Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- The Dumb Network Fuzzer☆19Updated last year
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆11Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year