Curriculum Vitae European & Biography
☆35Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for cve-bio-enovella
Users that are interested in cve-bio-enovella are comparing it to the libraries listed below
Sorting:
- ☆18Jun 21, 2019Updated 6 years ago
- modification of bibliotools 2.2 from Sébastian Grauwin☆12May 21, 2019Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- Easy to use APK/IPA Mobile App Inspector☆79Jun 30, 2022Updated 3 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- r2con2019 - slides and materials☆137Feb 19, 2020Updated 6 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- ☆31Feb 10, 2020Updated 6 years ago
- Create an outbound stream over a message transport.☆21Jun 16, 2025Updated 8 months ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- ☆18Jul 15, 2020Updated 5 years ago
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated 3 weeks ago
- Official Dexcalibur documentation☆17May 27, 2021Updated 4 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 9 years ago
- PoC to bypass Android restrictions☆217Mar 27, 2019Updated 6 years ago
- xnu kernel heap info leak☆71Nov 21, 2019Updated 6 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆48Jul 24, 2021Updated 4 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write