mellow-hype / cve-2024-20017Links
exploits for CVE-2024-20017
☆141Updated last year
Alternatives and similar repositories for cve-2024-20017
Users that are interested in cve-2024-20017 are comparing it to the libraries listed below
Sorting:
- ☆109Updated 11 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- An automatic Blind ROP exploitation tool☆206Updated 2 years ago
- ☆131Updated 2 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆216Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 7 months ago
- ☆11Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated last year
- CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/S…☆139Updated this week
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆170Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆322Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆75Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated last year
- ☆234Updated last year
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆154Updated 6 months ago
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- Custom exploits☆28Updated last year
- A full-featured open-source Wi-Fi fuzzer☆193Updated 2 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆125Updated last month
- Type diagram plugin for JADX decompiler☆72Updated last week
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated 2 years ago
- PoC for CVE-2024-48990☆105Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆58Updated 2 years ago
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- ☆207Updated last year
- Proof of concept & details for CVE-2025-21298☆190Updated 11 months ago
- ☆215Updated last year
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago