elttam / publicationsView external linksLinks
☆163Oct 2, 2025Updated 4 months ago
Alternatives and similar repositories for publications
Users that are interested in publications are comparing it to the libraries listed below
Sorting:
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- ☆523Feb 22, 2020Updated 5 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆211Apr 12, 2017Updated 8 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- ☆92Dec 23, 2017Updated 8 years ago
- python scripts☆15Dec 5, 2019Updated 6 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- Android APK analyzer based on radare2 and others.☆154Apr 9, 2020Updated 5 years ago
- An attempt at Process Doppelgänging☆183Dec 21, 2017Updated 8 years ago
- some vul☆789Apr 25, 2025Updated 9 months ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- PoC for CVE-2018-1002105.☆222Dec 21, 2018Updated 7 years ago
- Some tee/trustzone helper stuff☆56Sep 29, 2019Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆386Apr 16, 2022Updated 3 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- PoC☆211Jan 13, 2025Updated last year
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Droidefense: Advance Android Malware Analysis Framework☆478Dec 14, 2022Updated 3 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- ☆14Jun 7, 2018Updated 7 years ago
- ☆31Oct 14, 2025Updated 3 months ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,377Aug 8, 2024Updated last year
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Vulnerability Verification Environment based on Docker☆111Jun 17, 2019Updated 6 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- ☆17May 29, 2018Updated 7 years ago