marcinguy / android712-blueborne
☆65Updated this week
Related projects: ⓘ
- Blueborne CVE-2017-1000251 PoC for linux machines☆15Updated last year
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- ☆44Updated this week
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 6 years ago
- CVE-2017-0785 BlueBorne PoC☆39Updated 6 years ago
- LOCAL ROOT EXPLOITS☆36Updated 6 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 5 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 5 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 7 years ago
- ☆123Updated this week
- ☆204Updated this week
- Research material and Proof-of-Concepts for Aleph Research Findings☆84Updated 2 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- public exploits☆35Updated last year
- ☆71Updated 5 years ago
- ☆60Updated this week
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆161Updated 6 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆115Updated 4 years ago
- A GUI-based USB device fuzzer☆60Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆24Updated 9 years ago
- cve-2019-11931☆35Updated 4 years ago
- CVE-2018-8440 standalone exploit☆79Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 5 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆26Updated 5 years ago
- ☆38Updated this week
- HP printer security research code☆89Updated 6 years ago