leonjza / public-talks
🎤 A collection of presentation materials for my public talks.
☆21Updated 5 months ago
Alternatives and similar repositories for public-talks:
Users that are interested in public-talks are comparing it to the libraries listed below
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- ☆18Updated 5 years ago
- Android Malware Tracker☆27Updated last year
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 11 months ago
- My talks and papers☆37Updated last week
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- A javascript dll resolver for v8☆11Updated 4 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- frown (frida-own) – an instrumentation challenge☆24Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- ☆28Updated 4 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Modern Binary Exploitation write-ups.☆4Updated 5 years ago
- ☆23Updated 4 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- android-inject-hook☆16Updated 7 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 3 years ago
- A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken☆27Updated 5 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Updated 9 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago