From RD to Vulnerability Research
☆68Jun 10, 2020Updated 5 years ago
Alternatives and similar repositories for from-rd-to-vul-research
Users that are interested in from-rd-to-vul-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 16, 2021Updated 4 years ago
- a toy to play with siguza's very first 0 day - sandbox escape☆19Dec 10, 2020Updated 5 years ago
- IDA loader for Apple SecureROM☆13Sep 29, 2019Updated 6 years ago
- Fuzzing SILK with AFL☆25May 29, 2020Updated 5 years ago
- ☆18Mar 21, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CVE-2020-27950 exploit☆34Dec 1, 2020Updated 5 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Windows EoP Bugs☆126Jun 9, 2020Updated 5 years ago
- ☆23Mar 30, 2021Updated 5 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- Extreme Vulnerable IOKit driver☆91Jan 23, 2021Updated 5 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89May 7, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Corpus of public v8 vulnerability PoCs.☆224Jun 5, 2021Updated 4 years ago
- ☆23Nov 5, 2021Updated 4 years ago
- CVE-2020-8597 pppd buffer overflow poc☆48Mar 12, 2020Updated 6 years ago
- ☆87Feb 21, 2022Updated 4 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 6 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- 🍗An interactive way of pwnning.☆45Aug 1, 2019Updated 6 years ago
- Analysis Financial Attacker Groups, 金融行业攻击者团伙研究☆23Jun 24, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 安卓内核提权漏洞分析☆493Apr 27, 2019Updated 7 years ago
- ☆18Jun 14, 2018Updated 7 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆250Feb 15, 2023Updated 3 years ago
- Here is some resources about macOS/iOS system security.☆548Feb 19, 2025Updated last year
- A portable utility to locate android binder service☆100Sep 28, 2019Updated 6 years ago
- ☆30Feb 20, 2022Updated 4 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ROP userland execution for PS5 (4.03)☆238Jan 27, 2022Updated 4 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Jan 16, 2019Updated 7 years ago
- PoC☆212Jan 13, 2025Updated last year
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆83Feb 10, 2024Updated 2 years ago
- Materials from Fuzzing Bay Area meetups☆57Dec 23, 2019Updated 6 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 3 years ago