Skip to content
View maxwell-bland's full-sized avatar
💭
rb_node
💭
rb_node

Block or report maxwell-bland

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
maxwell-bland/README.md

Motorola smartphones are starting to get state-of-the-art kernel protections, brushing the dust off of a 14 year gap in work dedicated to hypervisor-level kernel protections. Check out the draft schematics for the seccomp filter purity test!

PDF redactions are broken, even the nontrivial ones where the underlying text is removed. Large parts of the tool are now available!

Y-AFL is the architecture-independent system-mode QEMU fuzzer used in Jetset to build an exploit for the Communication Management Unit of a Boeing 737. The important discovery is that CRIU is an excellent method for quickly creating effective fuzzers for complex software systems.

Jetset is a symbolic executor which uses QEMU's TCG IR during analysis, allowing for the incorporation of hardware semantics into program analysis routines.

G2 is a symbolic executor for Haskell, allowing for advanced bug detection and constraint solving in the context of lazy, functional languages.

Bluetana is an Android application and data analysis framework for detecting credit card skimming devices using bluetooth. The useful Android (Java) snippets, sanitized of anything sensitive, are available here.

Pinned Loading

  1. i3-natural-scrolling-and-tap i3-natural-scrolling-and-tap Public

    The above is a script that uses an alternate method to enable natural scrolling and tap-to-click on machines running the i3 window manager. This was created after a realization that, for machines t…

    Shell 55 5

  2. scapy-MITM scapy-MITM Public

    Small python script using Scapy to do ARP poisoning and redirection of IP addresses using iptables to perform a MITM attack. Used for https://www.youtube.com/watch?v=66x3vfac8rA

    Python 8 3

  3. yAFL yAFL Public

    Yet another AFL: around 300ish lines of code to create an architecture-independent and easy to use system mode QEMU fuzzer, along the lines of triforce AFL and FirmAFL; version two of the jetset fu…

    C 1

  4. x86-Protected-Mode-Angr x86-Protected-Mode-Angr Public

    x86 protected mode support for angr

    Python 1 1

  5. copilot-in-the-terminal copilot-in-the-terminal Public

    Hack to get Github Copilot working in the terminal with bash

    497 14

  6. deredaction deredaction Public

    Artifact for PETS 2023 "Story Beyond the Eye: Glyph Positions Break PDF Text Redaction"

    C++ 3