blasty / unwyze
☆123Updated last year
Related projects ⓘ
Alternatives and complementary repositories for unwyze
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆105Updated 8 months ago
- ☆201Updated 3 weeks ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 9 months ago
- An automatic Blind ROP exploitation tool☆190Updated last year
- Bluetooth Security Assessment Methodology☆110Updated 5 months ago
- ☆76Updated 5 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆79Updated 8 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆141Updated last year
- ☆40Updated 8 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆39Updated 3 weeks ago
- A tool for firmware cartography☆138Updated 8 months ago
- Hack-A-Sat Qualifiers Writeups☆235Updated last year
- ☆50Updated last year
- A full-featured open-source Wi-Fi fuzzer☆175Updated last week
- Slides and videos from my public speeches / conferences☆70Updated 3 weeks ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆91Updated last month
- ☆125Updated 3 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆161Updated 7 months ago
- A list of public attacks on BitLocker☆181Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆232Updated 2 weeks ago
- ASLR bypass without infoleak☆152Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆27Updated last month
- Leveraging patch diffing to discover new vulnerabilities☆108Updated last month
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆81Updated 3 weeks ago
- Binary Golf Grand Prix☆45Updated 2 months ago
- ☆115Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- exploits for CVE-2024-20017☆135Updated 2 months ago
- A structure-aware HTTP fuzzing library☆206Updated last year
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆83Updated last year