GDSSecurity / OSX-Continuity-Dialer-POC
☆23Updated 9 years ago
Alternatives and similar repositories for OSX-Continuity-Dialer-POC:
Users that are interested in OSX-Continuity-Dialer-POC are comparing it to the libraries listed below
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆27Updated 8 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- ☆48Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Memory awesomeness.☆29Updated 10 years ago
- ☆25Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A PoC Mach-O infector via library injection☆64Updated 12 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Bypass Google's Santa☆22Updated 10 years ago
- An OSX exploitation helper library.☆35Updated 9 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- Materials from presentation☆20Updated 9 years ago
- Ida Pro Ultimate Qt Build Guide☆26Updated 6 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- ☆71Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago