byu-cybersecurity-research / viloLinks
Documentation for Vilo router vulnerability research
☆15Updated 8 months ago
Alternatives and similar repositories for vilo
Users that are interested in vilo are comparing it to the libraries listed below
Sorting:
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆61Updated last month
- Repo for talk slides & materials☆19Updated 7 months ago
- ☆34Updated last year
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆120Updated last week
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆17Updated last year
- ☆60Updated last year
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- Static binary instrumentation for windows kernel drivers, to use with winafl☆75Updated 4 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- ☆33Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆18Updated 3 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆34Updated last week
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- javascript extension of windbg for hacker.☆15Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆124Updated 8 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- V8sandbox_bypass using stack misalignment☆20Updated 10 months ago
- ☆43Updated 2 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆138Updated last month
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆102Updated 4 months ago
- A tool for automating setup of kernel pwn challenges☆58Updated 3 weeks ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆18Updated 10 months ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- WTF Snapshot fuzzing of macOS targets☆96Updated last year
- ☆80Updated 9 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated last year