hetmehtaa / Mac_Vuln
☆131Updated 2 years ago
Related projects: ⓘ
- ☆113Updated 5 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆183Updated 2 years ago
- Fuzz iOS URL schemes☆105Updated this week
- Some presentations I did in the past☆63Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆221Updated 8 months ago
- SSD Secure Disclosure Advisories☆166Updated 4 years ago
- A collection of browser exploitation codes from Singular Security Lab.☆177Updated last year
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆229Updated 3 years ago
- esoteric☆50Updated 4 years ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆35Updated 4 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆98Updated 2 years ago
- Resources and writeups for studying & practicing iOS security☆49Updated 2 years ago
- ☆65Updated this week
- ☆69Updated 2 years ago
- A collection of curated resources and CVEs I use for research.☆99Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆55Updated 5 months ago
- ☆137Updated 2 years ago
- ☆151Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- ☆49Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆139Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆43Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆42Updated 2 years ago
- ☆129Updated 2 years ago
- A happy heap editor to support your exploitation process☆196Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆101Updated last year
- CVE-2022-22629 Proof of Concept☆50Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆119Updated 2 years ago
- ☆85Updated 2 years ago
- Collection of browser challenges☆121Updated 3 years ago