Ruturaj4 / Mobile-Security-Paper_summaries
Papers summaries of some of the most important Mobile Security Papers π
β7Updated 6 years ago
Alternatives and similar repositories for Mobile-Security-Paper_summaries:
Users that are interested in Mobile-Security-Paper_summaries are comparing it to the libraries listed below
- Fresh malware samples caught in the wild daily from random places. π£β18Updated 5 years ago
- Automated Information Retrieval From APKs For Initial Analysisβ32Updated 7 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Headβ¦β18Updated 4 years ago
- iOS malware samplesβ40Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.β16Updated 5 years ago
- Dataset of packed ELF samplesβ18Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blogβ13Updated 5 years ago
- Automated Payload Test Controllerβ9Updated 7 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326β17Updated 2 years ago
- Files related to my training classesβ15Updated 3 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.β18Updated 4 years ago
- β12Updated 8 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exerciseβ13Updated 5 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineeringβ21Updated 5 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntuβ42Updated 5 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode charactersβ13Updated 5 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )β20Updated 6 years ago
- Spider or repeater to find all links.β13Updated 3 years ago
- β20Updated 2 years ago
- Universal Malware Sample Encryptionβ10Updated last year
- Personal pwning toolset developed/used by myself. Use at your own risk.β15Updated 2 years ago
- A rootkit for linux kernel >= 3.0β19Updated 10 years ago
- Working exploit code for CVE-2019-17625β17Updated 4 years ago
- Research project on Automating Exploitation on Format String Vulnerabilitiesβ8Updated 8 years ago
- Code for my blog post on using S2E for malware analysisβ25Updated 5 years ago
- β17Updated 6 years ago
- Sources Codes of many Office Malwaresβ16Updated 2 years ago