0x36 / Pixel_GPU_Exploit
Android 14 kernel exploit for Pixel7/8 Pro
☆444Updated 4 months ago
Related projects: ⓘ
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆226Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆450Updated last month
- Android kernel exploitation for CVE-2022-20409☆156Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆158Updated 5 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆502Updated 2 months ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆272Updated last year
- Code Coverage Exploration Plugin for Ghidra☆324Updated 2 months ago
- ☆303Updated 3 months ago
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆220Updated last month
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆407Updated 4 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆135Updated 9 months ago
- Slides & Hands-on for the reverse engineering workshop☆178Updated last year
- Quarkslab conference talks☆264Updated 2 weeks ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆551Updated last month
- Android Kernel Exploitation☆569Updated 2 years ago
- IDA Plugin to automatically identify and set enums for standard functions☆304Updated this week
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆290Updated 7 months ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆580Updated 4 months ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆196Updated 10 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆321Updated last year
- GhidRust: Rust decompiler plugin for Ghidra☆231Updated 4 months ago
- ASLR bypass without infoleak☆150Updated 2 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆411Updated 5 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆157Updated 5 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆79Updated 7 months ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆218Updated 4 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆103Updated last year
- Analyze Golang with Ghidra☆99Updated 2 weeks ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆139Updated 2 weeks ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆221Updated 8 months ago