☆53Oct 21, 2024Updated last year
Alternatives and similar repositories for scudo-exploitation
Users that are interested in scudo-exploitation are comparing it to the libraries listed below
Sorting:
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- Yet another PyInstaller unpacking/decompilation tool☆19Dec 31, 2019Updated 6 years ago
- vasilisk☆19Dec 23, 2019Updated 6 years ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 10 months ago
- Unpacks java-to-exe files converted by JWrapper☆12Dec 5, 2022Updated 3 years ago
- A CPU Backdoor. Phrack 72☆15Dec 4, 2025Updated 3 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆161Dec 13, 2023Updated 2 years ago
- The rev.ng demos☆13Jan 29, 2026Updated last month
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Jul 28, 2025Updated 7 months ago
- Python binary DisAssembler☆25Apr 22, 2015Updated 10 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- Reverset is a reverse engineering, and binary analysis tool.☆19Jan 4, 2020Updated 6 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 6 years ago
- Breaking secure checksums in the scudo heap allocator☆13Apr 9, 2020Updated 5 years ago
- Prediction algorithms for the PCG pseudo-random generator☆14Nov 13, 2020Updated 5 years ago
- Security issue in the hypervisor firmware of some older Qualcomm chipsets☆41Dec 27, 2022Updated 3 years ago
- IDA Pro script to find interesting syscalls and patterns in binaries☆22Oct 18, 2024Updated last year
- ☆13Jan 30, 2025Updated last year
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- Repository for a library focused on binary analysis (mainly for Java related bytecodes)☆46Sep 19, 2025Updated 5 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆104Jan 31, 2024Updated 2 years ago
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- Android kernel exploitation for CVE-2022-20409☆203Oct 17, 2024Updated last year
- LLEF is a plugin for LLDB to make it more useful for RE and VR☆459Feb 27, 2026Updated last week
- a plugin to calculate complexity of executable's functions☆18May 17, 2022Updated 3 years ago
- reversing mtk-su☆17Mar 4, 2020Updated 6 years ago
- Bytecode Analysis Toolkit.☆17Oct 28, 2022Updated 3 years ago
- kCFI Documentation☆14Apr 18, 2017Updated 8 years ago
- ☆39Sep 27, 2022Updated 3 years ago