-
JD.com (@jd-opensource)
- Tianjin, China
-
08:09
(UTC +08:00) - https://wrlus.com/me
- @wrlu_xiaolu
Highlights
Starred repositories
📡 PoC auto collect from GitHub.
real time face swap and one-click video deepfake with only a single image
Collection of publicly available IPTV channels from all over the world
Versatile typeface for code, from code.
An app to view libraries used in apps in your device.
VPS 融合怪服务器测评项目 更推荐使用无环境依赖的Go版本 VPS Fusion Monster Server Test Script – More recommended to use the Go version with no environment dependencies: https://github.com/oneclickvirt/ecs
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
fancyss is a project providing tools to across the GFW on asuswrt/merlin based router.
A security focused static analysis tool for Android and Java applications.
Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing tools, and resources that can help us use fuzzer easily.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Reverse engineering and pentesting for Android applications
An efficient, small mobile key-value storage framework developed by WeChat. Works on Android, iOS, macOS, Windows, POSIX, and OHOS.
Get started with building Fullstack Agents using Gemini 2.5 and LangGraph
LSPass: Bypass restrictions on non-SDK interfaces
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more
Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk
Writeup and exploit for CVE-2024-49746: Android's Parcel::continueWrite closing File Descriptors that are later used
Writeup and exploit for CVE-2024-34740, integer overflow in Android's BinaryXmlSerializer to system_server file write and then to system_server code execution from normal installed app
Free Full Source: X-Argus, X-Ladon, X-Gorgon, TTEncrypt, XLog - Educational Purposes