quark-engine / quark-scriptLinks
Collections of Quark Script that detect vulnerabilities in the binaries.
☆20Updated this week
Alternatives and similar repositories for quark-script
Users that are interested in quark-script are comparing it to the libraries listed below
Sorting:
- My malware analysis code snippets☆27Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆78Updated 4 months ago
- ☆24Updated last year
- ☆28Updated 3 years ago
- ☆16Updated last year
- This repository contains multiple exploits I have written for various CVEs and CTFs☆25Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Shielder's public proof of concepts collection☆33Updated 10 months ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ASUS wifi router RCE vulnerability☆18Updated 10 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- ☆32Updated 6 months ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 3 years ago
- A MBR Fuzzer☆29Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- CVE-2024-53691☆11Updated 6 months ago
- ☆8Updated last year
- Detection Rules for Quark Engine. Please use the website below to explore our rules.☆31Updated last month
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆17Updated 2 years ago
- A collection of various exploits☆28Updated 10 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆20Updated 3 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated last year
- Slides and other material from various conference presentations.☆45Updated last month