grayhatacademy / mow
Mips Overflow Writer - Quickly write MIPS big/little overflows.
☆10Updated 5 years ago
Alternatives and similar repositories for mow:
Users that are interested in mow are comparing it to the libraries listed below
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- ☆36Updated 4 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆15Updated 2 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆60Updated 3 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 4 years ago
- ☆30Updated 5 months ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- Alleycat plugin by devttys0, ported to IDA 7☆15Updated 6 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Fuzzing Harness for FoxitReader 9.7 ConvertToPDF Function☆14Updated 5 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Magellan PoC☆34Updated 6 years ago
- A Python IDA Plugin that finds a route from one function to another.☆12Updated 6 years ago
- My conference presentations and publications☆26Updated 3 years ago
- ☆22Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- For code snippets and information☆41Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Updated 11 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- IDA (sort of) headless☆24Updated last year
- Analysis of VBS exploit CVE-2018-8174☆30Updated 6 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Updated 5 years ago
- a simple frida-based fuzzer for skylight based on @ret2systems pwn2own work☆30Updated 5 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- exploit development☆49Updated 7 years ago
- ☆33Updated 4 years ago