skysafe / reblog
SkySafe Miscellaneous Reverse Engineering Blog
☆766Updated last year
Alternatives and similar repositories for reblog:
Users that are interested in reblog are comparing it to the libraries listed below
- Some stuff about Hardware Hacking☆580Updated 7 months ago
- Intel Management Engine JTAG Proof of Concept☆513Updated 4 years ago
- Avast JavaScript Interactive Shell☆668Updated 4 years ago
- Utility to find AES keys in running processes☆334Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆292Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,495Updated 2 months ago
- Proof-of-concept for the ZombieLoad attack☆812Updated 3 years ago
- ☆518Updated last month
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,405Updated 6 years ago
- A fast, parallel test case minimization tool.☆952Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆327Updated 9 months ago
- Display, extract, and manipulate PSP firmware inside UEFI images☆625Updated 3 months ago
- GPU rootkit PoC by Team Jellyfish☆116Updated 9 years ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆804Updated 5 years ago
- Tracking history of USB events on GNU/Linux☆1,162Updated 2 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,336Updated last month
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆781Updated 3 weeks ago
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- Subaru StarLink persistent root code execution.☆562Updated 4 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆703Updated 6 months ago
- Obuscated C Christmas programs☆377Updated 2 years ago
- TESLA PowerWall 2 Security Shenanigans☆459Updated 9 months ago
- A Pwn2Own exploit chain☆759Updated 6 years ago
- Etherify - bringing the ether back to ethernet☆343Updated 3 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆770Updated 4 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,841Updated 2 months ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆798Updated 2 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆328Updated last year
- Slide decks from my conference presentations☆364Updated last year