Pinned Repositories
Android_Kernel_CVE_POCs
A list of my CVE's with POCs
cassle
Architecture to Validate TLS Certificates in Internet to avoid MITM Attacks
frida-jemalloc
Shadow port to be used with frida
frida-stalker-thread
Frida module to continue stalking on pthread_create
hardened_malloc
Hardened allocator implementation currently in early development. Can be tested externally with musl or glibc, but it will have custom internal integration into musl and Android's Bionic libc.
heapwn
Linux Heap Exploitation Practice
osxinternals
stuffs from Mac OS X internals a systems approachs
radare2
unix-like reverse engineering framework and commandline tools
frida-gum
Cross-platform instrumentation and introspection library written in C
alvarofe's Repositories
alvarofe/frida-stalker-thread
Frida module to continue stalking on pthread_create
alvarofe/frida-jemalloc
Shadow port to be used with frida
alvarofe/bug-hunting-101
alvarofe/ABD
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
alvarofe/bcov
A tool for efficient binary-level coverage analysis.
alvarofe/BinAbsInspector
BinAbsInspector: Vulnerability Scanner for Binaries
alvarofe/chrome-sbx-db
A Collection of Chrome Sandbox Escape POCs/Exploits for learning
alvarofe/cve-2019-2215
Android privilege escalation via an use-after-free in binder.c
alvarofe/Dobby
a lightweight, multi-platform, multi-architecture hook framework.
alvarofe/dotfile
dotfiles
alvarofe/dwm
alvarofe/ExAndroidNativeEmu
An improved version of AndroidNativeEmu,Allow running android elf on PC
alvarofe/FirmWire
FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband firmwares
alvarofe/fresco
An Android library for managing images and the memory they use.
alvarofe/frida-gum
Low-level code instrumentation library used by frida-core
alvarofe/fuzz_with_emus
Why fuzzing with emulators is amazing
alvarofe/Hypervisor-101-in-Rust
The materials of "Hypervisor 101 in Rust", a one-day long course, to quickly learn hardware-assisted virtualization technology and its application for high-performance fuzzing on Intel/AMD processors.
alvarofe/lkd-cve
Debugging Linux kernel CVEs
alvarofe/Malware-Analysis-Training
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
alvarofe/NucleusPlus
alvarofe/proc-macro-workshop
Learn to write Rust procedural macros [Rust Latam conference, Montevideo Uruguay, March 2019]
alvarofe/qasan
QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.
alvarofe/qsee_km_cacheattack
alvarofe/st
Luke's fork of the suckless simple terminal (st) with vim bindings and Xresource compatibility.
alvarofe/tc-build
A set of scripts to build LLVM and binutils
alvarofe/TEE-reversing
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
alvarofe/vendor-android-cves
Collections of my POCs for android vendor CVEs
alvarofe/whatsapp-web-reveng
Reverse engineering WhatsApp Web.
alvarofe/WindowsExploitationResources
Some random resources I have enjoyed for certain topics of Windows exploit development and semi-related topics
alvarofe/wtf
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.