VerSprite Security Research
☆171Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Aug 30, 2018Updated 7 years ago
- Vulnerability analysis and proof of concepts☆40May 15, 2023Updated 2 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Slide decks from my conference presentations☆368Sep 30, 2023Updated 2 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesign…☆259Nov 13, 2018Updated 7 years ago
- CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.☆54Jul 10, 2018Updated 7 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆236Jun 19, 2020Updated 5 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- ☆80Feb 26, 2025Updated last year
- Slides from my conference presentations.☆80Aug 5, 2020Updated 5 years ago
- ☆245Sep 21, 2021Updated 4 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 7 years ago
- A collection of links related to VMware escape exploits☆1,495Sep 4, 2024Updated last year
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,379Aug 8, 2024Updated last year
- some vul☆791Apr 25, 2025Updated 11 months ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆200Jul 27, 2022Updated 3 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Jul 6, 2024Updated last year
- load iOS12 kernelcaches and PAC code in IDA☆60Oct 4, 2018Updated 7 years ago
- Fuzzing Browsers☆317Dec 5, 2022Updated 3 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- Runtime memory analysis framework to identify Android malware☆145Apr 24, 2018Updated 7 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆940Nov 15, 2021Updated 4 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- ☆27Jan 8, 2022Updated 4 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆69Apr 29, 2021Updated 4 years ago
- POCs for IOMemoryDescriptor racing bugs in iOS/OSX kernels☆20Jan 8, 2017Updated 9 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- ☆157Jun 15, 2022Updated 3 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago