iPhone security labs
☆61Sep 17, 2011Updated 14 years ago
Alternatives and similar repositories for iPhoneLabs
Users that are interested in iPhoneLabs are comparing it to the libraries listed below
Sorting:
- Android security labs☆114Aug 2, 2019Updated 6 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- ☆11May 7, 2015Updated 10 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- A Cuckoo Sandbox Extension for Android☆76Jan 11, 2015Updated 11 years ago
- Public presentations given on Frida at conferences☆102Aug 18, 2019Updated 6 years ago
- Generic firmware for homebrew computer keyboard controllers.☆22May 30, 2010Updated 15 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Port Scapy to iOS☆28Feb 4, 2014Updated 12 years ago
- ☆10Mar 2, 2017Updated 8 years ago
- Beamer template with CUHK colors.☆14Jun 8, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ☆13Jul 31, 2016Updated 9 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Jul 12, 2023Updated 2 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- ☆34Jul 6, 2015Updated 10 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Apr 1, 2023Updated 2 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- ☆68May 29, 2012Updated 13 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- linux version (rewrite in Python)☆30May 13, 2015Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit☆42Feb 18, 2018Updated 8 years ago