mmiszczyk / CVE-2024-33352Links
BlueStacks privilege escalation through VM backdooring
☆21Updated last year
Alternatives and similar repositories for CVE-2024-33352
Users that are interested in CVE-2024-33352 are comparing it to the libraries listed below
Sorting:
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- BlackHat Asia 2025 code and presentations☆18Updated 6 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- hiding in plain sight: part 2☆45Updated last year
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆34Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆73Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆37Updated 6 months ago
- ☆13Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆36Updated last week
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Updated last year
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- Scripts to set up your own Android 📱 app hacking lab☆91Updated last year
- ECC Public Key Cryptography☆37Updated 2 years ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 11 months ago
- Web File Manager☆12Updated 2 months ago
- Powershell Scripts for Blue Team members☆11Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- ☆16Updated last year