skysafe / reblogLinks
SkySafe Miscellaneous Reverse Engineering Blog
☆766Updated last year
Alternatives and similar repositories for reblog
Users that are interested in reblog are comparing it to the libraries listed below
Sorting:
- Some stuff about Hardware Hacking☆602Updated last year
- Utility to find AES keys in running processes☆336Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,169Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆520Updated 5 years ago
- TESLA PowerWall 2 Security Shenanigans☆460Updated last year
- Subaru StarLink persistent root code execution.☆570Updated 4 years ago
- Etherify - bringing the ether back to ethernet☆347Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆121Updated 10 years ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆413Updated 11 months ago
- ☆521Updated 6 months ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆343Updated last year
- ☆1,118Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆355Updated last year
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆740Updated 11 months ago
- Avast JavaScript Interactive Shell☆673Updated 5 years ago
- Display, extract, and manipulate PSP firmware inside UEFI images☆642Updated 3 months ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆802Updated 6 months ago
- Obuscated C Christmas programs☆379Updated 3 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆307Updated 3 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,414Updated 6 years ago
- A Bluetooth low energy capture the flag☆705Updated 11 months ago
- Fully dockerized Linux kernel debugging environment☆754Updated 10 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,360Updated 6 months ago
- ☆128Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,518Updated 7 months ago
- documentations, slides decks...☆805Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- USB Keystroke Injection Protection☆540Updated 2 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 5 years ago