attilaszia / linux-iot-cvesLinks
☆47Updated 5 months ago
Alternatives and similar repositories for linux-iot-cves
Users that are interested in linux-iot-cves are comparing it to the libraries listed below
Sorting:
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- V8sandbox_bypass using stack misalignment☆23Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Universal root exploit for the linux kernel☆38Updated last year
- ☆63Updated last year
- ☆38Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Updated 11 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Updated 3 months ago
- Analysis of the vulnerability☆50Updated last year
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- ☆24Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆135Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- BINARLY Research Tools and PoCs☆39Updated last year
- xortigate-cve-2023-27997☆65Updated 2 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 9 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated last year
- ☆37Updated this week
- Attacking the cleanup_module function of a kernel module☆54Updated 6 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Updated 2 years ago
- ☆85Updated 4 months ago