inversecos / ios-moneymachineLinks
☆25Updated 3 years ago
Alternatives and similar repositories for ios-moneymachine
Users that are interested in ios-moneymachine are comparing it to the libraries listed below
Sorting:
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆41Updated last year
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Updated 4 years ago
- ☆10Updated 3 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- IDA Python scripts☆41Updated 6 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- BINARLY Research Tools and PoCs☆38Updated last year
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆63Updated 5 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 10 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆67Updated 8 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- ☆18Updated 9 months ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 5 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated last year
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆39Updated 10 months ago
- ☆39Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆48Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆17Updated 3 years ago
- A collection of PoCs for different injection techniques on Windows!☆46Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆80Updated 2 months ago
- ☆27Updated 11 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 8 months ago