hetmehtaa / Mac_VulnLinks
☆133Updated 3 years ago
Alternatives and similar repositories for Mac_Vuln
Users that are interested in Mac_Vuln are comparing it to the libraries listed below
Sorting:
- ☆127Updated this week
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- Some presentations I did in the past☆64Updated 2 years ago
- SSD Secure Disclosure Advisories☆169Updated 5 years ago
- Fuzz iOS URL schemes☆123Updated this week
- ☆146Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Updated 3 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 4 years ago
- ☆89Updated 3 years ago
- Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM☆176Updated 6 months ago
- VerSprite Security Research☆171Updated 2 years ago
- ☆56Updated 3 years ago
- Resources and writeups for studying & practicing iOS security☆64Updated 4 years ago
- ☆80Updated 9 months ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆150Updated 2 years ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆38Updated 5 years ago
- ☆49Updated 4 years ago
- ☆30Updated 4 months ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- Security issues I've reported in Edge☆47Updated 3 years ago
- ☆70Updated 2 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆159Updated 6 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆151Updated 3 years ago
- Collection of materials relating to FORCEDENTRY☆97Updated last year
- A set of pdf documents used during the fuzzing process☆17Updated 8 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆70Updated 4 years ago
- ☆156Updated 3 years ago
- I will provide details and pocs for some bugs I found.☆41Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago