H2HC 2019 Slides/Materials/Presentations
☆56Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for 2019
Users that are interested in 2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆73Nov 4, 2019Updated 6 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Feb 5, 2018Updated 8 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆17Aug 7, 2019Updated 6 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- H2HC 2016 Slides/Materials/Presentations☆28Dec 21, 2016Updated 9 years ago
- r2con2019 - slides and materials☆137Feb 19, 2020Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- ☆12May 6, 2020Updated 5 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- H2HC Magazine☆123Apr 15, 2025Updated last year
- ☆10Jan 24, 2026Updated 3 months ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Nov 18, 2019Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Sep 12, 2021Updated 4 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated 2 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Plugins for Scylla