aemmitt-ns / skeletonLinks
Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326
☆19Updated 3 years ago
Alternatives and similar repositories for skeleton
Users that are interested in skeleton are comparing it to the libraries listed below
Sorting:
- baseband security research☆84Updated 4 years ago
- practice☆68Updated 5 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- ☆92Updated 3 years ago
- ☆31Updated 4 months ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 5 years ago
- ☆19Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- ☆63Updated last month
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Updated 9 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- ☆31Updated 3 years ago
- ☆18Updated 5 years ago
- ☆32Updated 5 years ago
- ☆17Updated 7 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- ☆32Updated 4 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- exploit code for a bpf heap overflow vulnerability☆28Updated 6 years ago
- ☆33Updated 2 months ago
- USB device fuzzing on Android Phone☆34Updated 4 years ago
- VxWorks Fuzzer with AFL and QEMU☆49Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- MacOS kernel memory leak (4 bytes)☆30Updated 5 years ago
- ☆14Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago