omerporze / toothfairyView external linksLinks
CVE-2018-4330 POC for iOS
☆17Sep 13, 2018Updated 7 years ago
Alternatives and similar repositories for toothfairy
Users that are interested in toothfairy are comparing it to the libraries listed below
Sorting:
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 6 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ☆30May 23, 2017Updated 8 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Collection of (at time of release) iOS bugs I found☆56Jan 28, 2020Updated 6 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- TyphoonCon 2019☆53Aug 8, 2019Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆118Apr 19, 2018Updated 7 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Jul 4, 2018Updated 7 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- use afl to fuzz swift program☆24Nov 3, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- ☆68Mar 15, 2024Updated last year
- PoC☆212Jan 13, 2025Updated last year
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ☆13Jul 11, 2017Updated 8 years ago