GDSSecurity / OSX-Continuity-Dialer-POCLinks
☆23Updated 9 years ago
Alternatives and similar repositories for OSX-Continuity-Dialer-POC
Users that are interested in OSX-Continuity-Dialer-POC are comparing it to the libraries listed below
Sorting:
- LLDB engine based tool to instrument OSX apps and triage crashes☆27Updated 8 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- ☆48Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- ☆72Updated 10 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- Memory awesomeness.☆29Updated 10 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- XED based Disassembly Engine☆20Updated 7 years ago
- A PoC Mach-O infector via library injection☆64Updated 12 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Materials from presentation☆20Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- An OSX exploitation helper library.☆35Updated 9 years ago
- ☆25Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆84Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- ELF header abuse☆48Updated 9 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- small utility to dump kernel memory☆25Updated 10 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago