Code Samples for the book "The Definite Guide to ARM Exploitation"
☆52Aug 12, 2018Updated 7 years ago
Alternatives and similar repositories for the-definite-guide-to-arm-exploitation
Users that are interested in the-definite-guide-to-arm-exploitation are comparing it to the libraries listed below
Sorting:
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Feb 4, 2022Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- ☆18Mar 23, 2018Updated 7 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 12, 2019Updated 6 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- A compilation of resources for studying for the eCPPTv2☆16Sep 28, 2022Updated 3 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Nov 27, 2017Updated 8 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- ☆17Feb 27, 2020Updated 6 years ago
- Found resources in my malware researching adventure.☆17Dec 18, 2022Updated 3 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- Simple patcher tool to turn off TLS handshake validation in golang binaries☆12Apr 23, 2022Updated 3 years ago
- ☆15Feb 17, 2021Updated 5 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Feb 22, 2021Updated 5 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated last month
- ☆20Jan 24, 2022Updated 4 years ago
- bypass secure solutions in smart way☆18Dec 8, 2022Updated 3 years ago
- PiFunk Radio Transmitter - with FM/AM-Modulation for HAM-Bands (CB 27 & PMR 446)☆19Jan 26, 2026Updated last month
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,534Sep 16, 2024Updated last year
- just for fun☆18Jan 21, 2025Updated last year
- ☆31Aug 26, 2021Updated 4 years ago
- This repository contains the source of "ARM Binary Exploitaiton" book.☆27Apr 16, 2021Updated 4 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆78Sep 15, 2020Updated 5 years ago
- Python Bindings for qless☆47Sep 23, 2019Updated 6 years ago
- IDA Pro plugin manager☆22Jan 23, 2023Updated 3 years ago
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆26Jul 9, 2024Updated last year
- Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆48Jan 13, 2023Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago