attify / the-definite-guide-to-arm-exploitationView external linksLinks
Code Samples for the book "The Definite Guide to ARM Exploitation"
☆52Aug 12, 2018Updated 7 years ago
Alternatives and similar repositories for the-definite-guide-to-arm-exploitation
Users that are interested in the-definite-guide-to-arm-exploitation are comparing it to the libraries listed below
Sorting:
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Feb 4, 2022Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- ☆18Mar 23, 2018Updated 7 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 12, 2019Updated 6 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- ☆11Sep 12, 2022Updated 3 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Nov 27, 2017Updated 8 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- ☆17Feb 27, 2020Updated 5 years ago
- Simple patcher tool to turn off TLS handshake validation in golang binaries☆12Apr 23, 2022Updated 3 years ago
- ☆34Dec 3, 2016Updated 9 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Feb 22, 2021Updated 4 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 weeks ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- My tools repo☆17Oct 1, 2019Updated 6 years ago
- FirmwareDroid is an analysis framework for Android firmware and Apps.☆25Feb 6, 2026Updated last week
- PiFunk Radio Transmitter - with FM/AM-Modulation for HAM-Bands (CB 27 & PMR 446)☆19Jan 26, 2026Updated 3 weeks ago
- ☆20Jan 24, 2022Updated 4 years ago
- bypass secure solutions in smart way☆18Dec 8, 2022Updated 3 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,532Sep 16, 2024Updated last year
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- An Open Source software for connect, review and analyze packages of LoRa®, we recommend using with catWAN USB Stick☆22Dec 8, 2022Updated 3 years ago
- Python Bindings for qless☆47Sep 23, 2019Updated 6 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆78Sep 15, 2020Updated 5 years ago
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆26Jul 9, 2024Updated last year