wolfvan / IoT-Malware-Info
Repo with some info about malware in IoT
☆15Updated 6 years ago
Alternatives and similar repositories for IoT-Malware-Info:
Users that are interested in IoT-Malware-Info are comparing it to the libraries listed below
- Presented hardware reverse engineering workshops since 2019☆61Updated 9 months ago
- The FTP fuzzer for Sulley and Peach.☆54Updated 11 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆83Updated 6 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆25Updated 7 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- My Material for the HITB presentation☆35Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 3 years ago
- POC and exploitation of vulnerabilities☆90Updated 3 years ago
- ☆98Updated 3 years ago
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Updated 7 years ago
- Sample files for fuzzing ImageMagick☆19Updated 8 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- Machine Learning for Cyber Security☆27Updated 7 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- ☆52Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Automatic vulnerability detection and exploit generation☆16Updated 5 years ago
- How to get a linux kernel debug environment☆32Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Materials from Fuzzing Bay Area meetups☆57Updated 5 years ago
- Result files from various fuzzing runs☆16Updated 3 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- ☆44Updated 6 years ago
- ☆33Updated 5 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆72Updated 8 years ago
- ☆12Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago