subaru-starlink-research
Head unit exploit
Researchers aim to develop a jailbreak tool for Subaru StarLink head units, exploiting a known vulnerability to execute arbitrary code on the device.
Subaru StarLink persistent root code execution.
558 stars
29 watching
68 forks
last commit: over 4 years ago exploitationjailbreakreverse-engineeringvulnerability-research
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access | 16 |
| An exploit tool for iOS Surface vulnerabilities | 218 |
| A proof of concept exploit demonstrating a vulnerability in Android's SELinux implementation | 960 |
| Tools to program and manage STM32 microcontrollers using Rust | 3 |
| An exploit chain designed to remotely root modern Android devices using three identified vulnerabilities. | 166 |
| A proof-of-concept project demonstrating exploitation of a vulnerability in Jackson-databind via Spring application contexts and expressions. | 121 |
| Exploits a vulnerability in iOS 14.5 WebKit to gain jailbreak access | 649 |
| An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS | 404 |
| A collection of technical writeups on kernel exploits and webkit vulnerabilities for various platforms | 749 |
| This project provides a collection of security vulnerabilities discovered in various IoT devices from brands such as Dlink and Tenda. | 22 |
| Bypassing memory scanning to evade detection by the Karbenz CASB (Content Awareness Security Platform) security solution | 24 |
| A Gradle plugin that simplifies the configuration of unit/integration testing for Android projects using the Spock framework and Roboelectric. | 20 |
| Analyzes firmware vulnerabilities using concolic analysis and function clustering | 472 |
| Scans for vulnerable 3rd-party web applications on a network | 570 |
| Analyzing and categorizing exploitable bugs in smart contracts to improve vulnerability detection techniques | 1,554 |