byu-cybersecurity-research / viloLinks
Documentation for Vilo router vulnerability research
☆15Updated last year
Alternatives and similar repositories for vilo
Users that are interested in vilo are comparing it to the libraries listed below
Sorting:
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Updated 2 years ago
- ☆45Updated 4 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆154Updated 2 weeks ago
- ☆58Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 7 months ago
- A tool for automating setup of kernel pwn challenges☆60Updated 2 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated last month
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- ☆130Updated last year
- Static binary instrumentation for windows kernel drivers, to use with winafl☆79Updated 11 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 4 months ago
- A collection of web browser CTF challenges and solutions.☆32Updated 3 years ago
- ☆38Updated last year
- ☆66Updated 2 years ago
- Repo for talk slides & materials☆21Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆19Updated last year
- ☆70Updated 2 years ago
- An intuitive query API for IDA Pro☆165Updated 2 months ago
- ☆18Updated 4 months ago
- public archive for corCTF 2023☆18Updated 2 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆214Updated 2 weeks ago
- MCP for Pwn☆183Updated last month
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated 3 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆261Updated 3 months ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Updated 2 years ago
- A headless, extendable, multi-session, IDA Pro MCP framework.☆115Updated 3 months ago