Highlights
- Pro
Lists (12)
Sort Name ascending (A-Z)
Stars
- All languages
- ASL
- Assembly
- Batchfile
- BitBake
- C
- C#
- C++
- CMake
- CSS
- Dockerfile
- Eagle
- Elixir
- Go
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Max
- Meson
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- Shell
- Smali
- Solidity
- Stylus
- Swift
- TypeScript
- Vim Script
- Vue
- YARA
Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.
Proof of concept & details for CVE-2025-21298
Windows Local Privilege Escalation from Service Account to System
Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.
aiDAPal is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysis.
Emulation Wrapper Solution is a IDA Pro plugin that brings emulator capacities to provide features such as debugging an mocking.
Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.
vulhub / evil-ipp-server
Forked from h2g2bob/ipp-serverA evil IPP server to reproduce CVE-2024-47177
A IPP server. Written in python, it implements enough of IPP to fool CUPS into thinking its a real printer.
TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib
poc for CVE-2024-38063 (RCE in tcpip.sys)
A command and control framework written in rust.
A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.
Python Command-Line Ghidra Binary Diffing Engine