IamAlch3mist / Awesome-Embedded-Systems-Vulnerability-ResearchLinks
Resources to getting started vulnerability research on IoT/embedded devices.
☆82Updated 2 weeks ago
Alternatives and similar repositories for Awesome-Embedded-Systems-Vulnerability-Research
Users that are interested in Awesome-Embedded-Systems-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- Linux & Android Kernel Vulnerability research and exploitation☆53Updated last year
- ☆327Updated last year
- ☆184Updated 7 months ago
- Write-ups for various CTF☆198Updated 2 weeks ago
- various docs (that are interesting, or not, depending on the point of view...)☆128Updated last year
- A tool for automating setup of kernel pwn challenges☆60Updated 3 months ago
- Collection of browser challenges☆138Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆266Updated 9 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 8 months ago
- A bunch of V8 resources (with a security focus)☆56Updated this week
- ☆247Updated last month
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆76Updated 2 months ago
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- ☆182Updated last year
- Old and new CTFs about Linux kernel exploitation.☆58Updated 3 years ago
- ☆108Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆91Updated last week
- A collection of my weggli patterns to facilitate vulnerability research.☆145Updated 3 months ago
- ☆91Updated 2 years ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆113Updated 2 months ago
- prebuilt binaries for multiple architeture☆189Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆117Updated last year
- ☆45Updated last week
- a new class of file structure attacks☆54Updated 2 years ago
- Linux kernel privilege escalation techniques☆142Updated last year
- Exploit scripts for ctf challenges that involves linux kernel pwning☆10Updated 9 months ago
- ☆104Updated 8 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated 8 months ago
- A collection of PoCs for advanced Linux kernel exploits.☆69Updated last month