cyberark / Symda
☆15Updated 3 years ago
Alternatives and similar repositories for Symda:
Users that are interested in Symda are comparing it to the libraries listed below
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Escape macOS Sandbox using sharedfilelistd exploit☆59Updated 3 months ago
- Diaphora Machine Learning tools and datasets☆21Updated 7 months ago
- ☆23Updated 11 months ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 3 years ago
- TapJacking Attacks Demo☆20Updated 4 years ago
- Redirect spawned iOS application stdout and stderr to pty☆28Updated 3 months ago
- ☆78Updated 2 months ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆47Updated 7 months ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆32Updated 3 years ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆37Updated last month
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆21Updated 8 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- A collection of various exploits☆28Updated 7 months ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆24Updated 11 months ago
- ☆28Updated 3 years ago
- My talks and papers☆37Updated 3 weeks ago
- Frida plugin for Binary Ninja☆17Updated 3 months ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago
- javascript extension of windbg for hacker.☆15Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆44Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- Tools to bypass flawed SELinux policies using the init_module system call☆52Updated last year
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆26Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- A Ghidra extension for reverse-engineering macOS binaries.☆18Updated 3 months ago
- ☆28Updated 2 years ago
- ☆11Updated 4 years ago
- Frida's setHardwareWatchpoint tutorial☆41Updated 6 months ago