0x36 / Pixel_GPU_Exploit
Android 14 kernel exploit for Pixel7/8 Pro
☆489Updated 10 months ago
Alternatives and similar repositories for Pixel_GPU_Exploit:
Users that are interested in Pixel_GPU_Exploit are comparing it to the libraries listed below
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆239Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆511Updated 7 months ago
- Android kernel exploitation for CVE-2022-20409☆175Updated 4 months ago
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆285Updated 3 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆88Updated last year
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆356Updated 2 years ago
- ☆315Updated 8 months ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆311Updated last month
- Code Coverage Exploration Plugin for Ghidra☆340Updated 7 months ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆387Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆148Updated 4 months ago
- Slides & Hands-on for the reverse engineering workshop☆178Updated 2 years ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆631Updated 7 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆165Updated 11 months ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆158Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆611Updated 3 weeks ago
- Disclosures of third party vulnerabilities found by Meta☆28Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆288Updated last year
- An intuitive query API for IDA Pro☆155Updated 2 months ago
- aiDAPal is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysi…☆264Updated 3 months ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆997Updated this week
- ☆88Updated 2 months ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆599Updated 2 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆245Updated 3 months ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆162Updated 11 months ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆158Updated this week
- ☆172Updated 2 weeks ago
- Targeting Windows Kernel Driver Fuzzer☆161Updated last month
- gooMBA is a Hex-Rays Decompiler plugin to simplify Mixed Boolean-Arithmetic (MBA) expressions☆602Updated last year