alleleintel / researchLinks
Research developed by Allele Security Intelligence.
☆16Updated 6 months ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- ☆80Updated 11 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Browser exploitation v8 and sandbox escape challenges with solutions.☆29Updated 3 years ago
- ☆18Updated 5 years ago
- ☆13Updated 3 years ago
- Super IOCTL Basic Fuzzer☆15Updated 6 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- ☆16Updated last year
- A collection of various exploits☆28Updated last year
- ☆30Updated 2 months ago
- Slides about HyperDbg☆40Updated 6 months ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- ☆22Updated last month
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- A MBR Fuzzer☆31Updated last year
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- ☆13Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- ☆48Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- V8sandbox_bypass using stack misalignment☆23Updated last year
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- ☆38Updated last year
- An injector that use PT_LOAD technique☆12Updated 3 years ago