H2HC 2019 Slides/Materials/Presentations
☆56Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for 2019
Users that are interested in 2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆73Nov 4, 2019Updated 6 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Feb 5, 2018Updated 8 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆17Aug 7, 2019Updated 6 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- H2HC 2016 Slides/Materials/Presentations☆28Dec 21, 2016Updated 9 years ago
- r2con2019 - slides and materials☆137Feb 19, 2020Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- ☆12May 6, 2020Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- H2HC Magazine☆123Apr 15, 2025Updated last year
- ☆10May 7, 2026Updated last week
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Nov 18, 2019Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated 2 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- Plugins for Scylla☆21Sep 14, 2011Updated 14 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collection of generative art made by me.☆10Jul 8, 2018Updated 7 years ago
- Materials from Fuzzing Bay Area meetups☆57Dec 23, 2019Updated 6 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- CTF box with most tools installed☆89Aug 22, 2018Updated 7 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- The slides from my Saintcon 2019 talk.☆48Feb 9, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆89May 9, 2019Updated 7 years ago
- My Material for the HITB presentation☆33May 31, 2020Updated 5 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 6 years ago
- Signedness-Agnostic Strided-Interval☆38Jun 21, 2019Updated 6 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago