chensokolovsky / iosEnvLinks
docker env for ios research on a mac host
☆22Updated 6 months ago
Alternatives and similar repositories for iosEnv
Users that are interested in iosEnv are comparing it to the libraries listed below
Sorting:
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- ☆21Updated 3 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ☆22Updated last month
- ☆25Updated 2 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Automated Firebase security scanner to check for unauthorized read and write access on firestore, realtime databases, storage buckets and…☆33Updated 2 months ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- ☆25Updated last year
- A MBR Fuzzer☆30Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- ☆25Updated last month
- ☆82Updated last year
- ☆79Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last month
- Oversecured Vulnerable iOS App☆230Updated last year
- frown (frida-own) – an instrumentation challenge☆25Updated last year
- ☆33Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 4 months ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 4 years ago
- A curated list of argument injection vectors☆41Updated 11 months ago
- Automatically fuzz Rust projects from scratch☆58Updated 5 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated last month
- ☆116Updated 2 years ago