Jian-Xian / CVE-POCLinks
☆11Updated 4 years ago
Alternatives and similar repositories for CVE-POC
Users that are interested in CVE-POC are comparing it to the libraries listed below
Sorting:
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 10 months ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated 2 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆16Updated 3 years ago
- Decrypt encrypted SonicOSX firmware images☆18Updated 7 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆31Updated last year
- ☆31Updated last week
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 9 months ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Updated last year
- ☆38Updated 2 years ago
- USB testing made easy☆116Updated 2 years ago
- A MBR Fuzzer☆29Updated last year
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- HN Security's advisories.☆22Updated 5 months ago
- Cisco ASA Software and ASDM Security Research☆85Updated 3 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 7 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- ☆11Updated last month
- ☆31Updated 3 years ago
- A repository with UEFI research stuff☆16Updated 2 years ago
- ☆24Updated last month
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 3 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆22Updated this week
- ☆44Updated 4 years ago