darkmentorllc / publications
☆29Updated 8 months ago
Related projects: ⓘ
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆25Updated 4 years ago
- MacOS kernel memory leak (4 bytes)☆29Updated 4 years ago
- keynote I gave at GreHack 2019☆18Updated 4 years ago
- Some tee/trustzone helper stuff☆49Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 3 years ago
- PoC code for CVE-2018-9539☆18Updated 5 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆24Updated 5 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆30Updated 5 years ago
- ☆17Updated this week
- A Python IDA Plugin that finds a route from one function to another.☆12Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆51Updated 5 years ago
- ☆14Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆22Updated 7 months ago
- Worst Android kernel fuzzer☆43Updated 4 years ago
- A debugger / emulator for Ghidra☆14Updated 4 years ago
- Android privilege escalation via an use-after-free in binder.c☆37Updated 4 years ago
- Proof of Concept of TrustZone exploit☆15Updated 5 years ago
- ☆26Updated 9 months ago
- A firmware base address search tool.☆38Updated 3 months ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 4 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- My public presentations☆39Updated last year
- ☆35Updated 3 years ago
- ☆13Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆33Updated 11 months ago
- ☆16Updated 6 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆20Updated last year
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 4 years ago
- ☆29Updated 2 years ago