-
-
tinc
... a node to be sent
in plaintext. The first issue was trivial to exploit on tinc versions prior to
1.0.30, but the changes in ... 0.30 to mitigate the Sweet32 attack made this
weakness much harder to exploit. These issues have been fixed in tinc 1.0.35
and tinc ...
-
Whitelistr
... YET.
I encourage you to fork this project on github (link below) and fix bugs yourself - but if you have a security exploit that you feel is too sensitive, send it to me+whitelistrsecurity@luaduck.co.uk
What this system does:
Stores information in a ...
-
psfServiceMod_HermesFreedom
... Homebrew applications!
- You can now safely disconnect your device and return it to normal operation mode while enjoying this exploit.
====== How to Use Asbestos for devices that cant delay port switch (iPhone/iPod) =====
By now, asbestos only works ...
-
gprc5
... iBoot* kernelcache* file problems. If we can do it by checking MD5 of files, there's no need for it right now.
* gp limera1n exploit implementation is not as stable as redsn0w's , certainly on Mac only.
~ is this a i386/x86_64 problem?
* comex's saying ...
-
series-navigator
... , all of your navigation within
articles can be styled uniformly.
And there's more: the plugin is written
to exploit the WordPress shortcode
interface. This makes it possible
to add your navigation links anywhere
you like in your blog post, ...
-
blobseer
... manipulation of binary large objects in order to efficiently exploit data-level parallelism and sustain a high throughput despite ... of
binary large objects (BLOBs) in order to efficiently exploit
data-level parallelism and sustain a high throughput despite ...
-
dsi
...
If you want a prebuilt binary for generictwlpayload(it can't be completely built from this repo), check the released exploit saveimages(for example [here](https://github.com/yellows8/3ds_dsiwarehax_installer)).
Credits:
* See repo description text.
* ...
-
stockings
... gift-pairing, certain family members are often more sought-after than others (even though my cousins should know better by now; I exploit my status by giving them gag gifts that serve the sole purpose of bringing the lulz) so when we run this script ...
-
gitian-builder
... setup you would need to manually compile things on the target
TODO:
- disable sudo in target, just in case of a hypervisor exploit
- tar and other archive timestamp setter
## LXC tips
`bin/gbuild` runs `lxc-execute` or `lxc-start`, which may require ...
-
opticl
...
efficient access to image data. To date, opticl has only been tested
on SBCL, and, conversely, has been designed to exploit the
performance-enhancing characteristics of the SBCL compiler, such as
efficient access to specialized arrays (given proper type
...
-