skysafe / reblogLinks
SkySafe Miscellaneous Reverse Engineering Blog
☆769Updated 2 years ago
Alternatives and similar repositories for reblog
Users that are interested in reblog are comparing it to the libraries listed below
Sorting:
- Some stuff about Hardware Hacking☆612Updated last year
- Utility to find AES keys in running processes☆334Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,176Updated 3 years ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆420Updated last year
- Intel Management Engine JTAG Proof of Concept☆535Updated 5 years ago
- Subaru StarLink persistent root code execution.☆586Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,420Updated 7 years ago
- Etherify - bringing the ether back to ethernet☆344Updated 4 years ago
- GPU rootkit PoC by Team Jellyfish☆120Updated 10 years ago
- TESLA PowerWall 2 Security Shenanigans☆461Updated last year
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆523Updated last month
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,380Updated 11 months ago
- Ghidra analyzer for UEFI firmware.☆385Updated last year
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Updated 5 years ago
- Display, extract, and manipulate PSP firmware inside UEFI images☆674Updated last week
- ☆1,109Updated 5 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆817Updated 11 months ago
- The x86 processor fuzzer☆521Updated 7 years ago
- ☆1,505Updated 3 years ago
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆761Updated last year
- A guide and tool for cracking ssh known_hosts files with hashcat☆339Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- DNS covert channel implant for Red Teams.☆732Updated 6 years ago
- Proof-of-concept for the ZombieLoad attack☆826Updated 4 years ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆817Updated 6 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆315Updated 3 years ago
- ☆222Updated 6 years ago
- Proof of Concepts (PE, PDF...)☆1,532Updated last year
- documentations, slides decks...☆821Updated last year