hetmehtaa / Mac_VulnLinks
☆132Updated 3 years ago
Alternatives and similar repositories for Mac_Vuln
Users that are interested in Mac_Vuln are comparing it to the libraries listed below
Sorting:
- ☆122Updated 2 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Updated 3 years ago
- Some presentations I did in the past☆64Updated 2 years ago
- SSD Secure Disclosure Advisories☆169Updated 5 years ago
- ☆56Updated 3 years ago
- Fuzz iOS URL schemes☆123Updated 2 months ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Updated 3 years ago
- ☆79Updated 8 months ago
- ☆146Updated 3 years ago
- VerSprite Security Research☆171Updated 2 years ago
- Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM☆176Updated 6 months ago
- ☆89Updated 3 years ago
- ☆30Updated 4 months ago
- Resources and writeups for studying & practicing iOS security☆62Updated 4 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆150Updated 2 years ago
- ☆67Updated 3 years ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 3 years ago
- Security issues I've reported in Edge☆47Updated 3 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆151Updated 3 years ago
- ☆70Updated 2 years ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- '>"><img src=x onerror=alert(1) /><b>asd</b>☆47Updated 3 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆278Updated this week
- A happy heap editor to support your exploitation process☆197Updated 4 years ago
- I will provide details and pocs for some bugs I found.☆41Updated last year
- ☆49Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- A set of pdf documents used during the fuzzing process☆17Updated 8 years ago