This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/
☆28Jul 24, 2017Updated 8 years ago
Alternatives and similar repositories for BroadPWN
Users that are interested in BroadPWN are comparing it to the libraries listed below
Sorting:
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆42Nov 13, 2018Updated 7 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆25Sep 4, 2017Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆29Oct 13, 2017Updated 8 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Feb 3, 2017Updated 9 years ago
- Github Pages☆13May 22, 2023Updated 2 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- OS X kernel extension for reading MSRs (Model Specific Registers)☆12Sep 27, 2016Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA…☆20Apr 16, 2017Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.☆13Jan 25, 2025Updated last year
- A custom build of Cydia, designed for Meridian.☆12Jun 1, 2018Updated 7 years ago
- A simple implementation of a Mac OS X menu bar app for tutorial purposes.☆25Nov 7, 2013Updated 12 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Cheap and simple ADS-B base station for OpenSky Network☆11Jul 31, 2016Updated 9 years ago
- ☆45Jan 6, 2018Updated 8 years ago
- WP-Exploiter is a tool for testing and exploiting a wide range of WordPress websites.☆11Nov 27, 2020Updated 5 years ago
- Lynx 2 Settings Localizations☆12Jun 12, 2024Updated last year
- ☆11Jun 15, 2022Updated 3 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- An interactive web-based tool for analyzing, interrogating, and visualizing network meta-analyses using R-shiny☆15Updated this week
- Electron + Total.js + Flow☆11Mar 22, 2024Updated last year
- iOS 17 Major and Beta version releases updates☆11Oct 16, 2023Updated 2 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- Install Jailbreak tweaks without the hassle (Windows Version, Electra [iOS 11 - 11.1.2] Jailbreak Toolkit)☆15Feb 1, 2018Updated 8 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Apr 7, 2015Updated 10 years ago
- Exploits for Dell EMC RecoverPoint enterprise data protection platform☆13Jun 22, 2018Updated 7 years ago
- Explore the Electron APIs☆13Jun 2, 2016Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Tools for converting Nintendo DS binaries to an ELF file for Ghidra/IDA☆26Jan 28, 2022Updated 4 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago