LaurieWired / REcon2024
This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware
☆21Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for REcon2024
- Slides and videos from my public speeches / conferences☆70Updated 2 weeks ago
- list of organizations offering vulnerability research/reverse engineering jobs☆59Updated 3 months ago
- This contains notes, slides, and code for my Strange Loop talk☆24Updated last year
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated last year
- ASLR bypass without infoleak☆152Updated 3 years ago
- Source code and solutions for UofT's 2024 Capture the Flag Competition.☆17Updated 2 months ago
- This contains notes and slides for my Objective by the Sea talk☆93Updated last year
- Challenges and write-ups for GCC-CTF 2024☆19Updated 8 months ago
- Easily debug processes running in docker containers☆21Updated 4 months ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆41Updated 9 months ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆32Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆105Updated 7 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆78Updated 8 months ago
- Source code and solution of CTF challenges that I created.☆44Updated 4 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆95Updated 2 months ago
- This contains notes, slides, and code for my Infosec World talk☆15Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆30Updated last year
- ☆83Updated 3 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆27Updated 10 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆211Updated 6 months ago
- All Files, Scripts, and exploits can be found here☆59Updated 3 years ago
- ☆42Updated 2 years ago
- An automatic Blind ROP exploitation tool☆189Updated last year
- A guide to choosing between different Android Emulator options for Reverse Engineers☆83Updated last year
- Analyze Golang with Ghidra☆122Updated last week
- ☆63Updated 4 months ago
- Documentation for Vilo router vulnerability research☆12Updated 2 weeks ago
- ☆34Updated 6 months ago