phoenhex / filesLinks
☆526Updated 5 years ago
Alternatives and similar repositories for files
Users that are interested in files are comparing it to the libraries listed below
Sorting:
- Analysis of public exploits or my 1day exploits☆619Updated 4 years ago
- ☆461Updated 4 years ago
- iOS 11.1.2 (15B202) Jailbreak☆435Updated 4 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆182Updated last year
- macOS Kernel Fuzzer☆260Updated 7 years ago
- A Pwn2Own exploit chain☆762Updated 6 years ago
- ☆122Updated 7 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesign…☆257Updated 6 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆917Updated 3 years ago
- An iOS kernel exploit designated to work on all iOS devices <= 10.3.1☆333Updated 7 years ago
- Unstripped iOS Kernels☆219Updated 5 years ago
- This repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits☆254Updated 5 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Updated 7 years ago
- macOS Kernel Exploit for CVE-2019-8781.☆291Updated 5 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆157Updated 7 years ago
- ☆378Updated 5 years ago
- PoC☆210Updated 6 months ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆411Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- Some kernel exploits☆144Updated 7 years ago
- 35C3 Junior CTF pwnables☆149Updated 6 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Updated 8 years ago
- SSD Secure Disclosure Advisories☆169Updated 5 years ago
- IOHIDFamily 0day☆443Updated 2 years ago
- ☆192Updated 7 years ago
- Source code and exploits for some 35c3ctf challenges.☆141Updated 6 years ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- Cross Platform Kernel Fuzzer Framework☆451Updated 6 years ago