mellow-hype / cve-2024-20017Links
exploits for CVE-2024-20017
☆142Updated last year
Alternatives and similar repositories for cve-2024-20017
Users that are interested in cve-2024-20017 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆153Updated 6 months ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- ☆108Updated 10 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆318Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 6 months ago
- An automatic Blind ROP exploitation tool☆208Updated 2 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆74Updated last year
- ☆11Updated last year
- Type diagram plugin for JADX decompiler☆71Updated 2 weeks ago
- Custom exploits☆27Updated last year
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- ☆130Updated 2 years ago
- ☆234Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆183Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆101Updated last year
- A full-featured open-source Wi-Fi fuzzer☆192Updated 2 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Updated 2 years ago
- In-Memory Rootkit For Linux and BSD☆86Updated 3 months ago
- Proof of concept & details for CVE-2025-21298☆191Updated 10 months ago
- ☆214Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆92Updated 2 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆123Updated 3 weeks ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆26Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year