saaramar / echo_googlequals2020Links
☆12Updated 4 years ago
Alternatives and similar repositories for echo_googlequals2020
Users that are interested in echo_googlequals2020 are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- ☆13Updated 4 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 5 years ago
- CVE-2018-4330 POC for iOS☆18Updated 6 years ago
- Yet another IDA Pro real time syncing plugin☆16Updated 7 years ago
- CTF writeups☆9Updated 5 years ago
- My public presentations☆41Updated 2 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- Kernel Stack info leak at exportObjectToClient function☆42Updated 6 years ago
- ☆18Updated 3 years ago
- ☆37Updated 6 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- POC for cve-2019-1458☆21Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Export disassemblies into Protocol Buffers☆21Updated this week
- ☆35Updated 4 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆17Updated 2 years ago
- 2018 Advent Calendar browser pwnables☆15Updated 6 years ago
- ☆17Updated 4 years ago
- ¯\_(ツ)_/¯☆30Updated 5 years ago
- ☆11Updated 5 years ago
- ☆11Updated 6 years ago
- ☆30Updated 6 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ASLR bypass in Chrome version 77☆24Updated 5 years ago