- New York, NY
- https://yogehi.github.io/
- @Yogehi
Pinned Loading
-
MaliciousErection/YayPentestMagiskModuleYay
MaliciousErection/YayPentestMagiskModuleYay PublicCustom Magisk Module that combines various other modules, such as Movecert and Frida
-
MaliciousErection/drozer-agent-maliciouserection
MaliciousErection/drozer-agent-maliciouserection PublicSlightly modified version of the Drozer Agent application.
-
Ellume-COVID-Test_Research-Files
Ellume-COVID-Test_Research-Files PublicForked from FSecureLABS/Ellume-COVID-Test_Research-Files
Java
-
pwn2own2020-mitmInstallApp-docker
pwn2own2020-mitmInstallApp-docker PublicDocker image to exploit the Galaxy Apps store RCE exploit detailed at https://labs.f-secure.com/blog/samsung-s20-rce-via-samsung-galaxy-store-app/
-
CVE-2021-25374_Samsung-Account-Access
CVE-2021-25374_Samsung-Account-Access PublicForked from WithSecureLabs/CVE-2021-25374_Samsung-Account-Access
This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US …
Python
-
Cue-COVID-Test_Research-Files
Cue-COVID-Test_Research-Files PublicForked from WithSecureLabs/Cue-COVID-Test_Research-Files
JavaScript
If the problem persists, check the GitHub status page or contact support.