A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky
☆87Feb 22, 2017Updated 9 years ago
Alternatives and similar repositories for security-advisories
Users that are interested in security-advisories are comparing it to the libraries listed below
Sorting:
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Feb 17, 2016Updated 10 years ago
- ☆79May 13, 2016Updated 9 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Nov 22, 2018Updated 7 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Sep 15, 2016Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Android Device Testing Framework ("dtf")☆85Dec 26, 2022Updated 3 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- ☆16Jul 7, 2020Updated 5 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Feb 9, 2017Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- ☆140Jul 17, 2017Updated 8 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆253Jun 22, 2020Updated 5 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Sep 18, 2016Updated 9 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 9 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- CANToolz - framework for black-box CAN network analysis☆313Oct 31, 2017Updated 8 years ago