qkaiser / voodoo
This repository holds proof-of-concepts for the VOOdoo vulnerabilities found in NETGEAR CG3100 and CG3700B cable modems provided by VOO to its subscribers.
☆17Updated 3 years ago
Alternatives and similar repositories for voodoo:
Users that are interested in voodoo are comparing it to the libraries listed below
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆47Updated 2 years ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆9Updated 5 years ago
- ☆12Updated 2 years ago
- a 976-byte, GUI SKI calculus evaluator written in x86 assembly for windows☆8Updated 3 years ago
- A PNG file-smuggling tool and library!☆24Updated last year
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆9Updated 5 years ago
- World's First Haiku Ransomware/Malware☆10Updated 3 weeks ago
- Data graphing library for command line.☆15Updated 3 years ago
- This is a RCE bluetooth vulnerability on Android 8.0 and 9.0☆20Updated last year
- Samsung IPC library☆25Updated 11 years ago
- A radare2 Python script to dump a raw IA32 binary to an NASM source file☆30Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Official QEMU mirror☆31Updated 6 months ago
- A possible method for faster-than-light communication☆43Updated 11 months ago
- ld_preload userland rootkit☆33Updated 4 years ago
- Configure SPI flash write protection.☆23Updated 4 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 6 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- ☆12Updated 3 years ago
- ☆18Updated 3 years ago
- Various exploits for SerenityOS☆17Updated 3 years ago
- LM32 processor module for Ghidra. Useful for AMD SMU reverse engineering.☆12Updated 2 years ago
- Splits a single TCP port for a use with multiple services (in the spirit of sslh)☆35Updated 8 years ago
- chroot environments, done in a more elegant way☆11Updated last year
- Dump Windows registry hives as text.☆15Updated 5 years ago
- ☆11Updated 4 years ago
- Capturing audio (.wav) from target using a link☆12Updated 4 years ago