lexfo / cve-2017-11176View external linksLinks
☆26Oct 2, 2018Updated 7 years ago
Alternatives and similar repositories for cve-2017-11176
Users that are interested in cve-2017-11176 are comparing it to the libraries listed below
Sorting:
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆11Nov 24, 2022Updated 3 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- ☆16Jul 17, 2024Updated last year
- ☆35Apr 14, 2025Updated 10 months ago
- IDA Python's idc.py <= 7.3 compatibility module☆21Oct 11, 2019Updated 6 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- IDA Pro module for Toshiba MeP processors☆37Dec 31, 2018Updated 7 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆19Mar 26, 2025Updated 10 months ago
- ☆31Apr 20, 2016Updated 9 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- ☆20Jun 13, 2022Updated 3 years ago
- You don't need to be as fast as lightspeed, but a run on a treadm1ll surely doesn't hurt.☆53Jan 23, 2020Updated 6 years ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- ☆22Sep 26, 2023Updated 2 years ago
- ☆27Mar 1, 2022Updated 3 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- ☆31May 22, 2023Updated 2 years ago
- ☆28May 12, 2025Updated 9 months ago
- IDA (sort of) headless☆27Feb 17, 2024Updated last year
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Sep 18, 2016Updated 9 years ago
- ☆66Aug 15, 2023Updated 2 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- ☆25Feb 6, 2024Updated 2 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆34Dec 19, 2017Updated 8 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Apr 23, 2021Updated 4 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- ☆49Jan 25, 2018Updated 8 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆118Apr 19, 2018Updated 7 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- machofile is a module to parse Mach-O binary files☆91Updated this week