superkhung / luadec-tplink
Modified luadec version to decompile TP-Link Archer C7 LUA firmware.
☆22Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for luadec-tplink
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆77Updated 7 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆47Updated 7 years ago
- ☆28Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆87Updated 2 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆56Updated 3 years ago
- ☆30Updated 5 years ago
- a new class of file structure attacks☆45Updated last year
- ☆21Updated 3 years ago
- awesome iot exploit resource☆40Updated 3 months ago
- Linux kernel privilege escalation techniques☆110Updated 3 months ago
- a GDB plug-in for inspecting mallocng☆50Updated 3 months ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Updated 7 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆61Updated 10 months ago
- qemu vulnerablity.☆51Updated 3 years ago
- Find command injection and format string bugs in binaries☆13Updated 9 months ago
- ☆38Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆62Updated 2 months ago
- ☆106Updated 2 months ago
- prebuilt binaries for multiple architeture☆157Updated last year
- some ida script☆30Updated 3 years ago
- Notes and challenges from the HeapLAB course taught by Max Kamper.☆19Updated 3 years ago
- gdb plugin for linux kernel to debug slub☆50Updated 4 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- NVRAM emulator☆75Updated 5 months ago
- ☆18Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆198Updated 4 months ago
- ☆47Updated 2 years ago
- Debug pwn in docker, no need for virtual machines☆35Updated 2 years ago
- ☆97Updated 3 years ago