hetmehtaa / Mac_VulnLinks
☆133Updated 3 years ago
Alternatives and similar repositories for Mac_Vuln
Users that are interested in Mac_Vuln are comparing it to the libraries listed below
Sorting:
- ☆115Updated last year
- Some presentations I did in the past☆65Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆197Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆107Updated 4 years ago
- Fuzz iOS URL schemes☆126Updated 3 weeks ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 4 years ago
- ☆56Updated 3 years ago
- SSD Secure Disclosure Advisories☆170Updated 5 years ago
- ☆146Updated 2 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆123Updated 3 years ago
- ☆88Updated 3 years ago
- Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM☆173Updated 2 months ago
- Resources and writeups for studying & practicing iOS security☆58Updated 3 years ago
- ☆78Updated 5 months ago
- ☆49Updated 4 years ago
- ☆30Updated 3 weeks ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆147Updated 2 years ago
- VerSprite Security Research☆170Updated 2 years ago
- '>"><img src=x onerror=alert(1) /><b>asd</b>☆47Updated 3 years ago
- ☆68Updated 3 years ago
- How to develop your own zero day vulnerabilities for iOS☆29Updated 2 years ago
- Collection of materials relating to FORCEDENTRY☆99Updated last year
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- My journey through WebKit CVE-2016-4622 Exploitation process☆22Updated last week
- An automated setup for compiling & fuzzing Apache httpd server☆50Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆258Updated 8 months ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- A set of pdf documents used during the fuzzing process☆17Updated 8 years ago