Skip to content
View Yogehi's full-sized avatar

Organizations

@MaliciousErection

Block or report Yogehi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. MaliciousErection/YayPentestMagiskModuleYay MaliciousErection/YayPentestMagiskModuleYay Public

    Custom Magisk Module that combines various other modules, such as Movecert and Frida

    Shell 12 1

  2. MaliciousErection/drozer-agent-maliciouserection MaliciousErection/drozer-agent-maliciouserection Public

    Slightly modified version of the Drozer Agent application.

    Java 1 1

  3. Ellume-COVID-Test_Research-Files Ellume-COVID-Test_Research-Files Public

    Forked from FSecureLABS/Ellume-COVID-Test_Research-Files

    Java

  4. pwn2own2020-mitmInstallApp-docker pwn2own2020-mitmInstallApp-docker Public

    Docker image to exploit the Galaxy Apps store RCE exploit detailed at https://labs.f-secure.com/blog/samsung-s20-rce-via-samsung-galaxy-store-app/

    HTML 2 1

  5. CVE-2021-25374_Samsung-Account-Access CVE-2021-25374_Samsung-Account-Access Public

    Forked from WithSecureLabs/CVE-2021-25374_Samsung-Account-Access

    This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US …

    Python

  6. Cue-COVID-Test_Research-Files Cue-COVID-Test_Research-Files Public

    Forked from WithSecureLabs/Cue-COVID-Test_Research-Files

    JavaScript