skysafe / reblog
SkySafe Miscellaneous Reverse Engineering Blog
☆766Updated last year
Alternatives and similar repositories for reblog:
Users that are interested in reblog are comparing it to the libraries listed below
- Some stuff about Hardware Hacking☆585Updated 8 months ago
- Utility to find AES keys in running processes☆334Updated last year
- Intel Management Engine JTAG Proof of Concept☆516Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆342Updated 10 months ago
- Tracking history of USB events on GNU/Linux☆1,164Updated 2 years ago
- Avast JavaScript Interactive Shell☆670Updated 5 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 2 years ago
- Etherify - bringing the ether back to ethernet☆343Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆116Updated 9 years ago
- DNS covert channel implant for Red Teams.☆731Updated 5 years ago
- A Pwn2Own exploit chain☆760Updated 6 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆726Updated 7 months ago
- VirtualBox E1000 Guest-to-Host Escape☆1,406Updated 6 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,114Updated 4 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆785Updated last month
- Exploration of x86-64 ISA using speculative execution.☆308Updated 3 years ago
- The x86 processor fuzzer☆500Updated 6 years ago
- $50 Million CTF from Hackerone - Writeup☆589Updated 6 years ago
- ☆518Updated 2 months ago
- Scripts for the Ghidra software reverse engineering suite.☆1,064Updated 4 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,340Updated 2 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆297Updated 3 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆308Updated last year
- HiddenVM — Use any desktop OS without leaving a trace.☆2,421Updated 8 months ago
- ☆1,115Updated 4 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆506Updated 11 months ago
- Proof of Concepts (PE, PDF...)☆1,495Updated 3 months ago
- GLM uCode dumps☆286Updated 4 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,126Updated last year