zzzzfeng's Stars
unicorn-engine/unicorn
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
angr/angr
A powerful and user-friendly binary analysis platform!
JesusFreke/smali
smali/baksmali
qilingframework/qiling
A True Instrumentable Binary Emulation Framework
srsran/srsRAN_4G
Open source SDR 4G software suite from Software Radio Systems (SRS) https://docs.srsran.com/projects/4g
r0oth3x49/ghauri
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
Benjamin-Dobell/Heimdall
Heimdall is a cross-platform open-source tool suite used to flash firmware (aka ROMs) onto Samsung Galaxy devices.
hacksysteam/HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
KeenSecurityLab/BinAbsInspector
BinAbsInspector: Vulnerability Scanner for Binaries
microsoft/MSRC-Security-Research
Security Research from the Microsoft Security Response Center (MSRC)
marin-m/vmlinux-to-elf
A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)
0xricksanchez/paper_collection
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
enovella/TEE-reversing
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
jaykali/lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
googlesamples/android-testdpc
Test DPC is a sample device policy controller for use with Android Enterprise. It gives developers the ability to see how their app will behave in a managed context such as device owner or within a managed profile. Users can set up a work profile, enable work apps, set applications restrictions, manage security polices, and much more. The app also serves as a implementation reference for other DPCs
0xdea/semgrep-rules
A collection of my Semgrep rules to facilitate vulnerability research.
amalmurali47/git_rce
Exploit PoC for CVE-2024-32002
flagify-com/OctoMation
OctoMation是一款免费的,具有可视化拖拽功能的编排与自动化产品。通过精心编排的Playbook,OctoMation能够联动数百款安全、网络、IT和SaaS等产品的基础能力。其主要特点包括低代码剧本编排、自动化事件响应、标准化流程操作以及可视化过程监控。 借助OctoMation,运营团队能够开展7x24小时自动化事件响应,不仅可以大幅减少对人员的过度依赖,还能确保团队工作质量始终维持在较高的水准上,最终实现“极速降本增效”。
chip-red-pill/uCodeDisasm
michalbednarski/LeakValue
Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()
google/smali
quarkslab/samsung-trustzone-research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
safebuffer/CVE-2024-32002
CVE-2024-32002 RCE PoC
metaredteam/rtx-cve-2023-45779
Proof-of-concept code for Android APEX key reuse vulnerability
HimoriK/Modern-Reverse-Engineering-Docs
Modern Reverse Engineering books and resources
bkerler/tee_research
Some tee/trustzone helper stuff
darkmentorllc/publications
wrlu/DumpHarmony
Help dump system folders on HarmonyOS NEXT devices.
thinkerMid/bilibiliAntiAntifrida
反反frida调试
ghassani/mclf-ghidra-loader
A Mobicore Trustlet/Driver Binary Loader for Ghidra