dangtunguyen / TowelRoot
Gain root privilege by exploiting CVE-2014-3153 vulnerability
☆12Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for TowelRoot
- CTFs I've played so far☆17Updated last year
- Browser exploitation v8 and sandbox escape challenges with solutions.☆26Updated 2 years ago
- Some guides about general topics on information security☆13Updated 5 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆33Updated 4 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- Cheatsheets on binary patterns and magic numbers for reverse engineering☆9Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆51Updated 5 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆33Updated 3 years ago
- Files related to my training classes☆15Updated 3 years ago
- ☆11Updated 3 years ago
- Skul is a PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS).☆14Updated 6 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 5 years ago
- Create customized callgraph directly from your favorite IDE☆31Updated last week
- Android's native SSL pinning bypass using Frida☆14Updated 5 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆36Updated 11 years ago
- ☆21Updated 4 years ago
- Fuzzing framework to target native components of android applications☆15Updated 2 years ago
- My CTF writeups☆24Updated 3 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 3 years ago
- A tool to inject C code into ELF64 binaries☆29Updated 3 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆34Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆16Updated 2 years ago
- ☆20Updated 2 years ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆12Updated 3 years ago
- Here is a collage of reverse engineering topics that I find interesting☆10Updated 6 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 3 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆49Updated 6 years ago
- Organise and access data collected during internal network pentests☆8Updated 4 years ago