Code Samples for the book "The Definite Guide to ARM Exploitation"
☆53Aug 12, 2018Updated 7 years ago
Alternatives and similar repositories for the-definite-guide-to-arm-exploitation
Users that are interested in the-definite-guide-to-arm-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Feb 4, 2022Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Mar 23, 2018Updated 8 years ago
- ☆11Sep 12, 2022Updated 3 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Feb 22, 2021Updated 5 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆75Sep 15, 2020Updated 5 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Simplified Assembly Loader - a small tool to run (headerless) machine code.☆45Apr 16, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Content related to hardware hacking☆56Mar 28, 2019Updated 7 years ago
- A couple of examples for different nic templates (included in example) for Theos.☆17Jul 5, 2017Updated 8 years ago
- RHme3 CTF writeups☆21Aug 6, 2022Updated 3 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆947Nov 15, 2021Updated 4 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,552Sep 16, 2024Updated last year
- Timing Sidechannel workshop☆30Nov 25, 2013Updated 12 years ago
- Documentation for the Curious Bolt hardware hacking multi-tool☆15Feb 1, 2024Updated 2 years ago
- ☆31Aug 26, 2021Updated 4 years ago
- A fuzzer for the iOS kernel and userland☆46Aug 26, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- bypass secure solutions in smart way☆18Dec 8, 2022Updated 3 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆27Nov 15, 2012Updated 13 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Dumped entitlements☆17Nov 28, 2021Updated 4 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- 《Java加密与解密的艺术》第2版☆12Jan 17, 2019Updated 7 years ago
- This repository contains the source of "ARM Binary Exploitaiton" book.☆27Apr 16, 2021Updated 5 years ago
- BLEMystique is an ESP32 based custom BLE target☆14Dec 30, 2018Updated 7 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆362Jan 4, 2024Updated 2 years ago
- Arm Episodes☆79Jan 25, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago