hyrathon / PoCsLinks
Some Proof-of-Concepts of bugs I found
☆44Updated 5 years ago
Alternatives and similar repositories for PoCs
Users that are interested in PoCs are comparing it to the libraries listed below
Sorting:
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 5 years ago
- ☆103Updated 5 years ago
- ☆91Updated 2 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- PoC code for CVE-2017-13253☆37Updated 4 years ago
- poc for cve-2020-0022☆68Updated 5 years ago
- a simple frida-based fuzzer for skylight based on @ret2systems pwn2own work☆30Updated 6 years ago
- ☆11Updated 5 years ago
- ☆31Updated 4 months ago
- ☆14Updated 5 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- My slides☆89Updated 5 years ago
- ☆74Updated 7 years ago
- baseband security research☆84Updated 4 years ago
- Fuzzing SILK with AFL☆25Updated 5 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- A Webkit RCE exploit and an SBX bug☆33Updated 6 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 6 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Updated 7 years ago
- Magellan PoC☆34Updated 6 years ago
- ☆13Updated 6 years ago
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Updated 7 years ago
- Some tee/trustzone helper stuff☆54Updated 5 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆14Updated 7 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago