inversecos / ios-dontpopme
dontpopme bitches
☆19Updated 2 years ago
Related projects: ⓘ
- AES-256 Microsoft Cryptography API Example Use.☆29Updated 10 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 7 months ago
- hiding in plain sight: part 2☆40Updated 2 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆25Updated this week
- This repositery contains the slides, sometimes videos, and materials of my talks.☆25Updated last month
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆39Updated 2 years ago
- ☆38Updated last year
- ☆76Updated last month
- A collection of PoCs for different injection techniques on Windows!☆41Updated last year
- ios tingz☆58Updated 2 years ago
- ☆42Updated this week
- Exploit for CVE-2023-38571☆13Updated 11 months ago
- x64/x86 shellcode injector for Mac OS☆19Updated 2 weeks ago
- ☆24Updated 2 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆20Updated 2 years ago
- ☆57Updated 6 months ago
- ☆17Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 10 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆59Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆17Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 9 months ago
- This contains notes and slides for my Objective by the Sea talk☆90Updated 11 months ago
- ☆26Updated last month
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆43Updated 2 years ago
- ☆10Updated 2 years ago
- ECC Public Key Cryptography☆33Updated 10 months ago
- Z2A-BlackLotus Challenge stage 2 bootkit-rootkit analysis☆9Updated last year
- Brew Local Privilege Escalation exploit on Intel macOS☆17Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- Lena's scripts/code/resources for malware analysis☆16Updated 3 months ago