Materials from presentation
☆20Jan 18, 2016Updated 10 years ago
Alternatives and similar repositories for Shmoocon2016
Users that are interested in Shmoocon2016 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some files for hacking mach binaries in memory☆18Mar 29, 2015Updated 11 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 11 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 11 years ago
- Small util to dump the IDT table of a running OS X system with kmem enabled☆21May 5, 2014Updated 11 years ago
- volatility☆21Nov 16, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Darwin scripts toolbox☆25Dec 18, 2014Updated 11 years ago
- The kernel component of rootpipe fix for Mavericks☆27Apr 13, 2015Updated 11 years ago
- task_for_pid injection that doesn't suck☆58Aug 9, 2015Updated 10 years ago
- Sniffing on port messages☆28Nov 2, 2016Updated 9 years ago
- Xposed module for obtaining SQLCipher crypto keys☆39Dec 6, 2017Updated 8 years ago
- Small util to discover OS X sysent via bruteforce☆33Jun 27, 2016Updated 9 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 11 years ago
- The userland component of rootpipe fix for Mavericks☆14Apr 13, 2015Updated 11 years ago
- A decompiler for ruby code (both MRI and YARV)☆28May 17, 2012Updated 13 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Stay away iOS 9+ canOpenURL: restriction.☆32Apr 9, 2020Updated 6 years ago
- Android Security☆29Mar 14, 2014Updated 12 years ago
- Toolkit for binary iOS / OS X sandbox profiles☆145Nov 2, 2015Updated 10 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Nov 9, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Mar 4, 2019Updated 7 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- Decrypted iOS 10 Kernels☆80Aug 18, 2016Updated 9 years ago
- An OSX exploitation helper library.☆35Nov 29, 2015Updated 10 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆48Oct 19, 2015Updated 10 years ago
- enhanced version of the Mac OS X strip tool (can remove signatures and uuids with no other changes)☆33Dec 1, 2015Updated 10 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo☆72Mar 20, 2015Updated 11 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆170May 26, 2020Updated 5 years ago
- Framework for static and dynamic analysis in Android APKs☆33Jul 25, 2017Updated 8 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆86May 18, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- safe mode for testing safe mode☆36Nov 7, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- This repository hosts the documentation for the mixminion protocol☆11May 26, 2010Updated 15 years ago