securing / docs
Documents and whitepapers
☆11Updated 8 years ago
Alternatives and similar repositories for docs:
Users that are interested in docs are comparing it to the libraries listed below
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- exploit on macOS 10.11.x☆13Updated 6 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- USB MTP device stack and utilities☆8Updated 8 years ago
- Apple wireless research and tools☆17Updated 4 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆11Updated 2 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 5 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- Python FTP Fuzzer and Ability FTP Server POC☆8Updated 9 years ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Wireshark regression tests☆11Updated 4 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- Apache use after free bug infos / ASAN stack traces☆66Updated 6 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- ldid and ldid2☆13Updated 6 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- A kernel module to read/write QFPROM rows on Qualcomm SoC devices with TCP server support.☆15Updated 9 years ago
- LG Root Exploit☆35Updated 11 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 8 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆13Updated last year
- ☆12Updated 6 years ago