r3ggi / electroniz3rLinks
Take over macOS Electron apps' TCC permissions
☆217Updated 2 years ago
Alternatives and similar repositories for electroniz3r
Users that are interested in electroniz3r are comparing it to the libraries listed below
Sorting:
- A public collection of POCs & Exploits for the vulnerabilities I discovered☆400Updated 2 months ago
- Fuzz iOS URL schemes☆123Updated last week
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- macOS Security Research☆120Updated last year
- ☆215Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆167Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆189Updated last year
- An automatic Blind ROP exploitation tool☆208Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆112Updated 6 months ago
- A (small) web exploit framework☆97Updated 2 months ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Updated 3 years ago
- A Reflective Loader for macOS☆142Updated 4 months ago
- ☆233Updated last year
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- macOS persistence tool☆227Updated 3 years ago
- JavaScript for Automation (JXA) macOS agent☆88Updated 2 weeks ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆283Updated 2 years ago
- CVE-2023-33733 reportlab RCE☆118Updated 2 years ago
- Safari 1day RCE Exploit☆152Updated 8 months ago
- List of Awesome macOS Red Teaming Resources.☆239Updated 3 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆108Updated 5 months ago
- ☆177Updated 2 years ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆334Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆179Updated 2 years ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆143Updated last year
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- Swift 5 macOS agent☆113Updated last year