☆54Oct 21, 2024Updated last year
Alternatives and similar repositories for scudo-exploitation
Users that are interested in scudo-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 11 months ago
- Security Blogs - A simple aggregator for security news/blog☆26Apr 29, 2026Updated last week
- Breaking secure checksums in the scudo heap allocator☆14Apr 9, 2020Updated 6 years ago
- IDA Pro script to find interesting syscalls and patterns in binaries☆22Oct 18, 2024Updated last year
- vasilisk☆19Dec 23, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Security issue in the hypervisor firmware of some older Qualcomm chipsets☆43Dec 27, 2022Updated 3 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- ☆59Apr 8, 2024Updated 2 years ago
- ☆59Aug 30, 2023Updated 2 years ago
- Inject frida script when process starts☆24Jul 12, 2023Updated 2 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Model Context Protocol server for IDA☆27Mar 25, 2025Updated last year
- Samples of Shannon baseband firmware for research purposes.☆47Dec 17, 2021Updated 4 years ago
- reversing mtk-su☆17Mar 4, 2020Updated 6 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆159Dec 16, 2019Updated 6 years ago
- USB device fuzzing on Android Phone☆37Oct 16, 2021Updated 4 years ago
- LLEF is a plugin for LLDB to make it more useful for RE and VR☆483May 1, 2026Updated last week
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- An unofficial NHentai android client + VPN (https://github.com/Dar9586/NClientV2/tree/master)☆14Mar 5, 2023Updated 3 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆41Sep 8, 2025Updated 8 months ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆86Sep 9, 2024Updated last year
- A simple golang reverse engineering ida plugin☆19Dec 16, 2020Updated 5 years ago
- Tracing and parsing an executing binary file☆30Aug 7, 2015Updated 10 years ago
- Android kernel exploitation for CVE-2022-20409☆210Oct 17, 2024Updated last year
- Hexagon decompiler for Ghidra☆54Feb 15, 2022Updated 4 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a GDB plug-in for inspecting mallocng☆63Aug 10, 2024Updated last year
- A Chrome extension to easily toggle proxy settings☆17Feb 8, 2015Updated 11 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 5 months ago
- ☆39Sep 27, 2022Updated 3 years ago
- Android app for browsing and downloading content from Nhentai.net - currently in development☆11Apr 18, 2026Updated 3 weeks ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆81Jan 3, 2025Updated last year
- Python binary DisAssembler☆25Apr 22, 2015Updated 11 years ago