mmiszczyk / CVE-2024-33352
BlueStacks privilege escalation through VM backdooring
☆19Updated 7 months ago
Alternatives and similar repositories for CVE-2024-33352:
Users that are interested in CVE-2024-33352 are comparing it to the libraries listed below
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆38Updated 2 weeks ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆23Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆25Updated 8 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- ☆13Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆65Updated 6 months ago
- Ansible build for Afl++ Frida-Mode☆23Updated 8 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 8 months ago
- LNK-Dropper Builder☆19Updated 5 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated 4 months ago
- Keycloak admin API allows low privilege users to use administrative functions☆23Updated 4 months ago
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 2 months ago
- POC of CVE-2023-35086 only DoS☆45Updated last year
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆14Updated last year
- CVE-2023-6875 PoC☆25Updated last year
- aiohttp LFI (CVE-2024-23334)☆25Updated 11 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 9 months ago
- ☆5Updated 9 months ago
- Auto exploitation tool for CVE-2024-24401.☆32Updated 5 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆87Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ☆28Updated last year
- ☆15Updated 4 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆14Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆49Updated 3 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- damn-exploitable-android-app-apk☆38Updated last year