☆39Jun 6, 2024Updated last year
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- ☆15Nov 27, 2023Updated 2 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- ☆218Aug 27, 2025Updated 6 months ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- ☆13Nov 9, 2022Updated 3 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- ☆32Jun 13, 2023Updated 2 years ago
- ☆16Sep 27, 2021Updated 4 years ago
- ethpwn - the Swiss Army Knife for Smart Contract Hacking☆55Dec 3, 2025Updated 2 months ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- ☆19May 23, 2019Updated 6 years ago
- a7 sep bug☆55Sep 26, 2023Updated 2 years ago
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- ctfs-2020☆17Mar 15, 2020Updated 5 years ago
- A plugin to resolve .plt.sec symbols in IDA☆79Dec 13, 2020Updated 5 years ago
- ☆22Sep 26, 2023Updated 2 years ago
- ☆58Jan 29, 2024Updated 2 years ago
- Source code of "Dezhou Instrumentz" challenge from RealWorldCTF 2019 quals☆24Jan 3, 2021Updated 5 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆91Apr 8, 2019Updated 6 years ago
- ☆26Aug 28, 2024Updated last year
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆99Jan 21, 2024Updated 2 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- ☆13Feb 22, 2022Updated 4 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Slides of mine.☆12Apr 19, 2024Updated last year
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆491Oct 11, 2025Updated 4 months ago
- ☆227Dec 9, 2020Updated 5 years ago
- CVE-2025-21479 proof-of-concept, I think☆200Aug 16, 2025Updated 6 months ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆280May 27, 2023Updated 2 years ago
- Towards Sound Reassembly of Modern x86-64 Binaries (ASPLOS'25)☆19Apr 1, 2025Updated 10 months ago
- ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit☆19Oct 14, 2024Updated last year
- ☆15Apr 3, 2022Updated 3 years ago
- Heaps Don't Lie! Analyzes standard JVM and Android heap snapshots to improve the completeness of program analysis tools such as Doop.☆16Updated this week
- ☆10Sep 1, 2021Updated 4 years ago