mellow-hype / cve-2024-20017Links
exploits for CVE-2024-20017
☆139Updated last year
Alternatives and similar repositories for cve-2024-20017
Users that are interested in cve-2024-20017 are comparing it to the libraries listed below
Sorting:
- ☆105Updated 9 months ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆151Updated 4 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆73Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆317Updated 10 months ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated last year
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆129Updated 5 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- ☆11Updated last year
- A full-featured open-source Wi-Fi fuzzer☆193Updated 3 weeks ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated last year
- ☆128Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- Tools to bypass flawed SELinux policies using the init_module system call☆59Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆88Updated last month
- Type diagram plugin for JADX decompiler☆67Updated 2 months ago
- ☆230Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- MCP for Pwn☆129Updated last month
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Proof of concept & details for CVE-2025-21298☆190Updated 9 months ago
- ☆213Updated last year
- In-Memory Rootkit For Linux and BSD☆82Updated 2 months ago
- Custom exploits☆26Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆71Updated last year