0x36 / Pixel_GPU_Exploit
Android 14 kernel exploit for Pixel7/8 Pro
☆482Updated 8 months ago
Alternatives and similar repositories for Pixel_GPU_Exploit:
Users that are interested in Pixel_GPU_Exploit are comparing it to the libraries listed below
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆237Updated last year
- Android kernel exploitation for CVE-2022-20409☆164Updated 3 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆490Updated 5 months ago
- Code Coverage Exploration Plugin for Ghidra☆336Updated 5 months ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆282Updated last year
- ☆311Updated 6 months ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆299Updated 2 months ago
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆277Updated last month
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆422Updated 8 months ago
- Slides & Hands-on for the reverse engineering workshop☆178Updated 2 years ago
- Quarkslab conference talks☆281Updated 2 weeks ago
- exploits for CVE-2024-20017☆138Updated 4 months ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆83Updated 11 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆559Updated last month
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆365Updated 2 months ago
- A Collection of Android (Samsung) Security Research References☆401Updated last week
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆162Updated 9 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆336Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆153Updated 3 months ago
- Nyxstone: assembly / disassembly library based on LLVM, implemented in C++ with Rust and Python bindings, maintained by emproof.com☆337Updated last month
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆240Updated last month
- Analyze Golang with Ghidra☆133Updated 2 weeks ago
- aiDAPal is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysi…☆220Updated 2 months ago
- An intuitive query API for IDA Pro☆152Updated 2 weeks ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆162Updated 9 months ago
- ☆161Updated this week
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆595Updated 3 weeks ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆713Updated this week
- LLEF is a plugin for LLDB to make it more useful for RE and VR☆356Updated 5 months ago