devttys0 / delink
☆88Updated last month
Alternatives and similar repositories for delink:
Users that are interested in delink are comparing it to the libraries listed below
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated 11 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- ☆78Updated 5 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 10 months ago
- ☆167Updated 2 weeks ago
- ☆121Updated 3 months ago
- A tool for firmware cartography☆145Updated 2 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆97Updated last week
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆75Updated last month
- Damn Vulenerable Kernel Module for kernel fuzzing☆55Updated 3 months ago
- Targeting Windows Kernel Driver Fuzzer☆157Updated 2 weeks ago
- Arlo file format helper☆12Updated 11 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆66Updated 2 weeks ago
- ☆58Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated 9 months ago
- An automatic Blind ROP exploitation tool☆196Updated last year
- ☆122Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆111Updated 3 months ago
- ☆70Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆125Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆142Updated 3 months ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆158Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 8 months ago
- ☆33Updated 8 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 9 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆62Updated 7 months ago
- ASLR bypass without infoleak☆158Updated 3 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 5 months ago
- LPE exploit for CVE-2024-0582 (io_uring)☆98Updated 10 months ago