mailinneberg / BroadpwnLinks
Broadpwn bug (CVE-2017-9417)
☆52Updated 8 years ago
Alternatives and similar repositories for Broadpwn
Users that are interested in Broadpwn are comparing it to the libraries listed below
Sorting:
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆28Updated 8 years ago
- ☆47Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- CVE-2017-0785 BlueBorne PoC☆40Updated 8 years ago
- ☆72Updated 10 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆166Updated 7 years ago
- A multi-codec media fuzzing tool.☆43Updated 13 years ago
- Arm Episodes☆78Updated 7 years ago
- ☆65Updated 8 years ago
- dropbox of random test code...☆33Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ☆12Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 9 years ago
- Unlock security module, obtain root privilege and so on.☆52Updated 9 years ago
- ☆27Updated 8 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- Vulnerability Reports by Aleph Research☆35Updated last year
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago