TaszkSecLabs / presentationsLinks
☆31Updated last year
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- USB device fuzzing on Android Phone☆32Updated 3 years ago
- ☆31Updated 3 years ago
- ☆41Updated 3 years ago
- ☆19Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆61Updated 8 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆91Updated 2 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- PoC for House of Husk Exploit☆13Updated 5 years ago
- ☆11Updated 3 years ago
- ☆30Updated 2 years ago
- use for unlock research☆23Updated 2 years ago
- ☆33Updated 5 months ago
- ☆49Updated last year
- ☆14Updated 2 years ago
- IDA (sort of) headless☆26Updated last year
- ☆57Updated 3 years ago
- ☆34Updated 4 years ago
- ☆66Updated 2 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆67Updated 3 years ago
- ☆10Updated 4 years ago
- Research related☆89Updated 3 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- ☆20Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- ☆33Updated 8 months ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago