devttys0 / delinkLinks
☆104Updated 8 months ago
Alternatives and similar repositories for delink
Users that are interested in delink are comparing it to the libraries listed below
Sorting:
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆119Updated last year
- MCP for Pwn☆118Updated 3 weeks ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- Reverse Engineering and Observability toolkit for Draytek firewalls☆41Updated 7 months ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 9 months ago
- Decrypt TP-Link Firmware☆49Updated 8 months ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- ☆129Updated 10 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆82Updated this week
- A tool for firmware cartography☆158Updated 3 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 7 months ago
- ☆247Updated 2 months ago
- ☆128Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆64Updated 11 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆242Updated 2 weeks ago
- Leveraging patch diffing to discover new vulnerabilities☆134Updated 11 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆220Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆126Updated 4 months ago
- Kernel Read Write Execute☆46Updated 8 months ago
- ☆82Updated last year
- ☆36Updated last year
- Research browsers☆43Updated 4 months ago
- ☆105Updated last year
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆70Updated last week
- Code Coverage Exploration Plugin for Ghidra☆361Updated last year
- Binarly Vulnerability Research Advisories☆180Updated 2 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago