binarly-io / ToolsAndPoCs
BINARLY Research Tools and PoCs
☆35Updated 5 months ago
Alternatives and similar repositories for ToolsAndPoCs:
Users that are interested in ToolsAndPoCs are comparing it to the libraries listed below
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆35Updated 3 months ago
- ☆11Updated 5 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 5 months ago
- ☆34Updated 9 months ago
- A collection of various exploits☆27Updated 6 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- PoC code and tools for Black Hat USA 2024☆20Updated 7 months ago
- A MBR Fuzzer☆29Updated 11 months ago
- rpv-web is a browser based frontend for the rpv library☆24Updated 7 months ago
- V8sandbox_bypass using stack misalignment☆18Updated 6 months ago
- ☆32Updated last year
- ☆12Updated 2 years ago
- some sploits☆17Updated 6 months ago
- Proof-of-Concept for CVE-2024-26218☆49Updated 10 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 9 months ago
- ☆18Updated this week
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 2 weeks ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 3 months ago
- Analysis of the vulnerability☆49Updated last year
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- ☆18Updated 2 months ago
- Slides about HyperDbg☆30Updated 9 months ago
- ☆23Updated last month
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated last year
- ☆29Updated 3 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago