Shellcode, reports of Amazon Echo, which we have presented on Defcon26
☆39Aug 12, 2018Updated 7 years ago
Alternatives and similar repositories for Exploit-Amazon-Echo
Users that are interested in Exploit-Amazon-Echo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Dec 5, 2023Updated 2 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- Python script to split Android boot.img files.☆12Nov 11, 2012Updated 13 years ago
- realworld ctf live stream☆74Feb 4, 2024Updated 2 years ago
- keystone-engine bindings python. support Xcode10 compilation in Mojave. targets for ida macOS☆29Oct 24, 2021Updated 4 years ago
- ☆17May 19, 2022Updated 3 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Tool for detecting error handling bugs☆23Sep 11, 2016Updated 9 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 8 years ago
- My slides☆89Nov 4, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A standalone Java Decompiler GUI☆14Nov 14, 2021Updated 4 years ago
- ☆14Feb 15, 2019Updated 7 years ago
- on Mac 10.12.2☆20Aug 3, 2018Updated 7 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- ☆50Jan 25, 2018Updated 8 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- ctf challenges by salt☆16Jul 8, 2019Updated 6 years ago
- Extract and generate code based on name and type for mig func/arg/request&reply member etc, ideal helper for creating monitor, tracker, f…☆18Jun 5, 2018Updated 7 years ago
- Spreadtrum/Unisoc tools and utilities https://unisoc-android.github.io☆28Feb 7, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Toolkit developed to reverse engineer Google's Nearby Connections API☆23Dec 11, 2018Updated 7 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- ☆22Apr 12, 2019Updated 7 years ago
- CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.☆87Mar 7, 2018Updated 8 years ago
- CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)☆36Mar 21, 2021Updated 5 years ago
- ☆19May 23, 2019Updated 6 years ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 4 years ago
- ☆97Jan 9, 2021Updated 5 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sniffing on port messages☆28Nov 2, 2016Updated 9 years ago
- 在目标主机上执行php、asp、aspx 插件☆23Feb 1, 2019Updated 7 years ago
- A 0day exploit for ur0‘s apfs bug by me (Pwn20wnd)☆128Jun 14, 2018Updated 7 years ago
- ☆26Apr 15, 2011Updated 15 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 8 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆984Jan 7, 2026Updated 3 months ago