Jian-Xian / CVE-POC
☆11Updated 3 years ago
Alternatives and similar repositories for CVE-POC
Users that are interested in CVE-POC are comparing it to the libraries listed below
Sorting:
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- ☆12Updated 3 months ago
- ☆31Updated last month
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 5 years ago
- ☆22Updated 7 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆33Updated 5 months ago
- ☆30Updated 3 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆23Updated this week
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Ditto.☆17Updated 4 years ago
- ☆29Updated last year
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- Hexagon processor module for IDA Pro disassembler☆18Updated 2 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆46Updated 2 years ago
- Cisco MIPS debugger☆59Updated 7 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- ☆9Updated 6 years ago
- A debugger / emulator for Ghidra☆14Updated 5 years ago
- Some tee/trustzone helper stuff☆52Updated 5 years ago
- ☆18Updated 2 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 8 months ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆19Updated 3 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 5 years ago
- ☆26Updated 6 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- A mini bytecode Interpreter for v8.☆23Updated 2 years ago