PoC for CVE-2024-38399
☆25Sep 25, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2024-38399
Users that are interested in CVE-2024-38399 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security issue in the hypervisor firmware of some older Qualcomm chipsets☆43Dec 27, 2022Updated 3 years ago
- ☆137May 1, 2023Updated 3 years ago
- ☆23Aug 5, 2025Updated 9 months ago
- ☆16May 12, 2025Updated 11 months ago
- ☆59Apr 8, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The companion repository for the 39C3 talk: Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU☆39Feb 4, 2026Updated 3 months ago
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆53Sep 3, 2025Updated 8 months ago
- CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC☆91Jul 11, 2025Updated 9 months ago
- Linux kernel privilege escalation techniques☆154Aug 9, 2024Updated last year
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable x86_64 Linux kernels v5.10.x.☆289Jan 5, 2026Updated 4 months ago
- ☆223Aug 27, 2025Updated 8 months ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆96Aug 25, 2024Updated last year
- ☆12Dec 26, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆286May 27, 2023Updated 2 years ago
- Hook no original for jailed devices, limit at 6 (because of Apple). Based on iSH hook and Ellekit☆30Mar 14, 2025Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Apr 12, 2023Updated 3 years ago
- Slides from Off-By-One Conferences☆34Sep 9, 2024Updated last year
- ☆31Oct 14, 2025Updated 6 months ago
- Emulating firmware poorly but quickly!☆17Dec 18, 2020Updated 5 years ago
- Android kernel exploitation for CVE-2022-20409☆210Oct 17, 2024Updated last year
- ☆17Aug 19, 2024Updated last year
- Linux kernel exploitation experiments☆408Apr 25, 2026Updated 2 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆86Sep 19, 2024Updated last year
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆132Oct 9, 2025Updated 7 months ago
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- An open-source benchmark for evaluating AI agents' ability to find backdoors hidden in compiled binaries.☆88Feb 27, 2026Updated 2 months ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆81Jan 3, 2025Updated last year
- CVE-2025-21479 proof-of-concept, I think☆238Aug 16, 2025Updated 8 months ago
- ☆52Apr 27, 2026Updated last week
- ☆39Jun 6, 2024Updated last year
- macOS kext with kernel R/W, kalloc and kcall☆108Jun 21, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 8 months ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 10 months ago
- ☆16Nov 9, 2022Updated 3 years ago
- ☆11May 17, 2024Updated last year
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆21Sep 16, 2023Updated 2 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- gosec动态规则修改版☆12Jun 29, 2021Updated 4 years ago