blasty / unwyze
☆123Updated last year
Alternatives and similar repositories for unwyze:
Users that are interested in unwyze are comparing it to the libraries listed below
- ☆88Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- ☆203Updated 5 months ago
- ☆50Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆151Updated 5 months ago
- Bluetooth Security Assessment Methodology☆125Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last week
- An automatic Blind ROP exploitation tool☆201Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- ☆77Updated 10 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- Arlo file format helper☆12Updated last year
- Userland exec PoC to be used as attack vector technique☆84Updated 2 months ago
- A tool for firmware cartography☆147Updated 3 months ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆22Updated 3 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆250Updated 4 months ago
- Leveraging patch diffing to discover new vulnerabilities☆120Updated 5 months ago
- ☆40Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆107Updated this week
- examples of using radius2 to solve reversing challenges☆35Updated 3 months ago
- A full-featured open-source Wi-Fi fuzzer☆187Updated last month
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated 2 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- ☆114Updated last year
- Slides and videos from my public speeches / conferences☆73Updated this week