tomasz-lisowski / simurai-usenixsec2024-ae
☆15Updated 5 months ago
Alternatives and similar repositories for simurai-usenixsec2024-ae:
Users that are interested in simurai-usenixsec2024-ae are comparing it to the libraries listed below
- Force target victim to unsafe network☆20Updated this week
- A repository with UEFI research stuff☆14Updated last year
- ☆14Updated 8 months ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆15Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆13Updated 2 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- A PC/SC IFD handler to attach swICC-based cards through a software PC/SC reader.☆31Updated 9 months ago
- ASUS wifi router RCE vulnerability☆16Updated 7 months ago
- Proof of Concept for CVE-2023-22906☆7Updated last year
- Check for the existence of an email on Google platforms☆14Updated last year
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated 2 months ago
- ☆8Updated 11 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆74Updated 6 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated last year
- ☆13Updated last month
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 3 weeks ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Fuzz Network Traffic☆18Updated 3 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 10 months ago
- Powershell Scripts for Blue Team members☆12Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- ☆24Updated 2 years ago