onekey-sec / BHEU23-firmware-workshopLinks
In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can interact with the services in real-time.
☆53Updated last year
Alternatives and similar repositories for BHEU23-firmware-workshop
Users that are interested in BHEU23-firmware-workshop are comparing it to the libraries listed below
Sorting:
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆62Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆122Updated last year
- ☆81Updated last year
- ☆130Updated last year
- ☆37Updated last year
- ☆60Updated last year
- A in-the-wild V8 type confusion bug.☆28Updated 3 months ago
- ☆70Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Updated last year
- ☆32Updated 2 years ago
- ☆66Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Updated last year
- Reverse Engineering and Observability toolkit for Draytek firewalls☆46Updated 8 months ago
- Shielder's public proof of concepts collection☆33Updated 3 months ago
- POC of CVE-2023-35086 only DoS☆44Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Repo for talk slides & materials☆21Updated 11 months ago
- ☆133Updated last month
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- MCP for Pwn☆145Updated last week
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 9 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 11 months ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated last month
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- Proof of concept code for CVE-2023-2008☆40Updated 2 years ago