Curriculum Vitae European & Biography
☆35Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for cve-bio-enovella
Users that are interested in cve-bio-enovella are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 21, 2019Updated 6 years ago
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Easy to use APK/IPA Mobile App Inspector☆79Jun 30, 2022Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆48Jul 24, 2021Updated 4 years ago
- r2con2019 - slides and materials☆137Feb 19, 2020Updated 6 years ago
- Create an outbound stream over a message transport.☆22Jun 16, 2025Updated 10 months ago
- ☆31Feb 10, 2020Updated 6 years ago
- PoC to bypass Android restrictions☆218Mar 27, 2019Updated 7 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 10 years ago
- xnu kernel heap info leak☆71Nov 21, 2019Updated 6 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 7 years ago
- ☆18Jul 15, 2020Updated 5 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Some Proof-of-Concepts of bugs I found☆45Aug 26, 2019Updated 6 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- A simple way to exfiltrate data using spotify API☆19Apr 20, 2026Updated 2 weeks ago
- ☆29Apr 12, 2020Updated 6 years ago
- Check Android device security settings☆89Oct 25, 2019Updated 6 years ago
- ☆22May 3, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆53Sep 3, 2025Updated 8 months ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆27Mar 10, 2026Updated 2 months ago
- Fighting String Encryption in Android Malware☆59May 23, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Oct 20, 2020Updated 5 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- ☆76Jul 9, 2017Updated 8 years ago
- An entry level resource to learning bug bounty.☆28Apr 11, 2018Updated 8 years ago
- Grab your libboringssl keys to decrypt traffic (pcaps)☆62Jul 5, 2020Updated 5 years ago
- ☆76Nov 28, 2025Updated 5 months ago