skysafe / reblogLinks
SkySafe Miscellaneous Reverse Engineering Blog
☆769Updated last year
Alternatives and similar repositories for reblog
Users that are interested in reblog are comparing it to the libraries listed below
Sorting:
- Some stuff about Hardware Hacking☆610Updated last year
- Utility to find AES keys in running processes☆334Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,178Updated 3 years ago
- Subaru StarLink persistent root code execution.☆580Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆532Updated 5 years ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆349Updated last year
- Etherify - bringing the ether back to ethernet☆347Updated 4 years ago
- TESLA PowerWall 2 Security Shenanigans☆463Updated last year
- VirtualBox E1000 Guest-to-Host Escape☆1,422Updated 7 years ago
- GPU rootkit PoC by Team Jellyfish☆120Updated 10 years ago
- ☆523Updated 10 months ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆419Updated last year
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,373Updated 10 months ago
- Ghidra analyzer for UEFI firmware.☆373Updated last year
- Display, extract, and manipulate PSP firmware inside UEFI images☆674Updated 2 weeks ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆812Updated 10 months ago
- Here I share the code of my CV, which is also a bootable bootloader :)☆523Updated last month
- ☆1,109Updated 5 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆338Updated last year
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Updated 5 years ago
- Obuscated C Christmas programs☆379Updated 3 years ago
- ☆1,504Updated 3 years ago
- Proof of Concepts (PE, PDF...)☆1,532Updated 11 months ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆746Updated last year
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆311Updated 2 years ago
- Fully dockerized Linux kernel debugging environment☆771Updated last year
- A Bluetooth low energy capture the flag☆731Updated 4 months ago
- Proof-of-concept for the ZombieLoad attack☆822Updated 3 years ago