Notselwyn / exploitsLinks
Custom exploits
☆26Updated last year
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- ☆51Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated 11 months ago
- POC of CVE-2023-35086 only DoS☆44Updated 2 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆50Updated last year
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- Shielder's public proof of concepts collection☆33Updated last month
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆117Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- ☆11Updated last year
- ☆71Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- ☆49Updated last month
- ☆81Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated last month
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- BINARLY Research Tools and PoCs☆37Updated 11 months ago
- V8sandbox_bypass using stack misalignment☆22Updated last year
- ☆24Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 9 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- An automatic Blind ROP exploitation tool☆203Updated 2 years ago
- Linux rootkit for educational purposes☆33Updated last year
- ☆36Updated last year
- A in-the-wild V8 type confusion bug.☆28Updated last month
- ☆42Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆41Updated 6 months ago