mellow-hype / cve-2024-20017
exploits for CVE-2024-20017
☆133Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for cve-2024-20017
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆253Updated 3 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆211Updated 6 months ago
- LPE exploit for CVE-2024-0582 (io_uring)☆91Updated 7 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆105Updated 7 months ago
- CVE-2023-4911 proof of concept☆163Updated last year
- ☆123Updated last year
- ☆117Updated 2 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆62Updated 3 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆333Updated last month
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆90Updated 11 months ago
- An automatic Blind ROP exploitation tool☆189Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆69Updated 8 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆38Updated last month
- BlueStacks privilege escalation through VM backdooring☆22Updated 3 months ago
- A full-featured open-source Wi-Fi fuzzer☆174Updated last week
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆117Updated last month
- Proof-of-concept code for Android APEX key reuse vulnerability☆81Updated 9 months ago
- Full exploit chain for Faronics-DeepFreeze-8☆3Updated last year
- Wireless Hacking Devices Protocol client☆126Updated this week
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆155Updated 11 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆231Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆119Updated last week
- nysm is a stealth post-exploitation container.☆237Updated 10 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆123Updated 7 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆29Updated last month
- Slides and videos from my public speeches / conferences☆70Updated 2 weeks ago
- ASLR bypass without infoleak☆152Updated 3 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year
- ☆208Updated 7 months ago
- ☆172Updated last year