chensokolovsky / iosEnvLinks
docker env for ios research on a mac host
☆22Updated 2 months ago
Alternatives and similar repositories for iosEnv
Users that are interested in iosEnv are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 months ago
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 11 months ago
- ☆25Updated last year
- ☆33Updated 2 years ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated 3 weeks ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- ☆80Updated last year
- A curated list of argument injection vectors☆41Updated 7 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 8 months ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated last year
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- ☆23Updated 7 months ago
- ☆116Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 7 months ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆22Updated 6 months ago
- frown (frida-own) – an instrumentation challenge☆24Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- External Playbooks for Public Access☆39Updated 6 months ago
- Automated compromise detection of the world's most popular packages☆17Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 5 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Collection of Semgrep rules for security analysis☆10Updated last year