devttys0 / delinkLinks
☆107Updated 10 months ago
Alternatives and similar repositories for delink
Users that are interested in delink are comparing it to the libraries listed below
Sorting:
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆122Updated last year
- MCP for Pwn☆145Updated last week
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆53Updated last year
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- A tool for firmware cartography☆161Updated 5 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated 2 weeks ago
- ASLR bypass without infoleak☆163Updated 4 years ago
- Decrypt TP-Link Firmware☆50Updated last month
- ☆130Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆62Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 9 months ago
- ☆130Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆64Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- ☆43Updated last year
- Arlo file format helper☆16Updated last year
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆97Updated this week
- A tool for automating setup of kernel pwn challenges☆60Updated 2 weeks ago
- Code Coverage Exploration Plugin for Ghidra☆366Updated last year
- ☆81Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- ☆133Updated last month
- exploits for CVE-2024-20017☆140Updated last year
- Kernel Read Write Execute☆46Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆166Updated last year
- Reverse Engineering and Observability toolkit for Draytek firewalls☆46Updated 8 months ago
- ☆209Updated 2 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆274Updated this week
- Binary Exploitation Phrack CTF Challenge☆69Updated 2 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆254Updated last month