feliam / CVE-2014-4377Links
☆72Updated 10 years ago
Alternatives and similar repositories for CVE-2014-4377
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
Sorting:
- An OSX exploitation helper library.☆35Updated 9 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆84Updated 9 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Updated 9 years ago
- macOS Class Tree☆21Updated 7 years ago
- ☆25Updated 9 years ago
- ELF header abuse☆48Updated 9 years ago
- Google Project Zero OS X Vul Report Analysis☆33Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- CVE-2018-4087 PoC☆59Updated 6 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Updated 9 years ago
- POC for CVE-2018-4327☆42Updated 7 years ago
- XED based Disassembly Engine☆20Updated 7 years ago
- A collection of useful radare2 scripts!☆32Updated 7 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- iOS Frida Scripts☆37Updated 7 years ago
- Exploit code for CVE-2016-1757☆84Updated 9 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- CVE-2015-2231 POC☆10Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Updated 8 years ago
- ☆48Updated 9 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆80Updated 10 years ago
- xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo☆73Updated 10 years ago
- Vulnerability research and development.☆25Updated 10 years ago