skysafe / reblogLinks
SkySafe Miscellaneous Reverse Engineering Blog
☆769Updated last year
Alternatives and similar repositories for reblog
Users that are interested in reblog are comparing it to the libraries listed below
Sorting:
- Some stuff about Hardware Hacking☆608Updated last year
- Utility to find AES keys in running processes☆334Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,172Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆527Updated 5 years ago
- Subaru StarLink persistent root code execution.☆580Updated 5 years ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆418Updated last year
- Etherify - bringing the ether back to ethernet☆347Updated 4 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- ☆1,112Updated 4 years ago
- GPU rootkit PoC by Team Jellyfish☆119Updated 10 years ago
- Ghidra analyzer for UEFI firmware.☆372Updated last year
- Obuscated C Christmas programs☆379Updated 3 years ago
- TESLA PowerWall 2 Security Shenanigans☆463Updated last year
- ☆522Updated 10 months ago
- Display, extract, and manipulate PSP firmware inside UEFI images☆669Updated 2 weeks ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,416Updated 7 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆811Updated 9 months ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆339Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆309Updated 3 years ago
- Proof-of-concept for the ZombieLoad attack☆819Updated 3 years ago
- A "living" Linux process with no memory☆351Updated 5 years ago
- $50 Million CTF from Hackerone - Writeup☆596Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Updated 5 years ago
- Here I share the code of my CV, which is also a bootable bootloader :)☆523Updated 3 weeks ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,372Updated 9 months ago
- File formats☆965Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- ☆1,505Updated 3 years ago
- Decrypt WhatsApp encrypted media files☆994Updated 5 years ago