Jian-Xian / CVE-POCLinks
☆11Updated 4 years ago
Alternatives and similar repositories for CVE-POC
Users that are interested in CVE-POC are comparing it to the libraries listed below
Sorting:
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆34Updated 11 months ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated 2 years ago
- ☆31Updated last month
- A repository with UEFI research stuff☆16Updated 2 years ago
- Decrypt encrypted SonicOSX firmware images☆18Updated 8 months ago
- A MBR Fuzzer☆30Updated last year
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- ☆36Updated 10 months ago
- ☆31Updated 3 weeks ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- USB testing made easy☆116Updated 2 years ago
- A tool to perform so called BGE attack☆25Updated 4 months ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Updated 2 months ago
- ☆31Updated 3 years ago
- Kernel and filesystem extractor☆60Updated 3 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- ☆44Updated 4 years ago
- ☆38Updated 2 years ago
- Plugin for Frida in Binary Ninja☆27Updated 4 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 11 months ago
- ☆16Updated 3 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- Disable SSL certificate verification for all binaries that use libssl☆48Updated 3 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 8 months ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 4 years ago