☆38Jul 3, 2017Updated 8 years ago
Alternatives and similar repositories for Google-Nest-Cam-Bug-Disclosures
Users that are interested in Google-Nest-Cam-Bug-Disclosures are comparing it to the libraries listed below
Sorting:
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- ☆18Feb 26, 2018Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- an automated command-line cydia repo generator/builder and server.☆14Jun 12, 2019Updated 6 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆15Feb 16, 2016Updated 10 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- fun stuff☆79Mar 26, 2016Updated 9 years ago
- iTLB multihit PoC☆42Nov 4, 2023Updated 2 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- r2-based tool to decrypt iOS applications☆38Sep 9, 2016Updated 9 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Apr 12, 2016Updated 9 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- ☆25May 30, 2017Updated 8 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- ☆23Jun 24, 2025Updated 8 months ago
- ☆18Mar 1, 2017Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Feb 22, 2017Updated 9 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- simple radare2 rap:// server☆26Sep 13, 2016Updated 9 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Jan 10, 2020Updated 6 years ago