pentestpartners / bits-for-blogLinks
☆15Updated 2 weeks ago
Alternatives and similar repositories for bits-for-blog
Users that are interested in bits-for-blog are comparing it to the libraries listed below
Sorting:
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- In memory fuzzing for embedded devices☆19Updated 12 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆56Updated 7 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- dropbox of random test code...☆33Updated 9 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- ☆16Updated 6 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Updated 13 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 8 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- ☆16Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Python FTP Fuzzer and Ability FTP Server POC☆8Updated 9 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Updated 12 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- BSides Munich Frida Workshop 2018☆48Updated 6 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Updated 11 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- ☆22Updated 6 years ago
- Tools for IDA☆13Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- Automatically exported from code.google.com/p/wifuzz☆35Updated 9 years ago
- slide☆12Updated 7 years ago