0x742 / CVE-2020-0082-ExternalVibration
This repo contains a proof-of-concept for π±ππβ‘, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.
β27Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0082-ExternalVibration:
Users that are interested in CVE-2020-0082-ExternalVibration are comparing it to the libraries listed below
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)β22Updated 6 years ago
- β102Updated 5 years ago
- Android privilege escalation via an use-after-free in binder.cβ38Updated 4 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Appsβ18Updated 4 years ago
- β17Updated 5 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecryptoβ16Updated 3 years ago
- USB device fuzzing on AndroidΒ Phoneβ31Updated 3 years ago
- β18Updated 2 years ago
- β28Updated last year
- Official Dexcalibur documentationβ16Updated 3 years ago
- Frida: callback based hooking of Java classes loaded at runtimeβ35Updated 2 years ago
- PoC code for CVE-2017-13253β38Updated 4 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted deviceβ39Updated 4 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Betaβ27Updated 2 years ago
- Frida FDE bruteforce Samsung S7 Edgeβ48Updated 5 years ago
- β55Updated 2 months ago
- reversing mtk-suβ17Updated 5 years ago
- β11Updated 2 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidraβ11Updated 5 years ago
- β32Updated 5 years ago
- Some Proof-of-Concepts of bugs I foundβ44Updated 5 years ago
- MacOS kernel memory leak (4 bytes)β30Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)β35Updated last year
- β30Updated 5 months ago
- Simple proto parser with a guiβ19Updated 4 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break siβ¦β42Updated 3 years ago
- β29Updated 3 years ago
- β11Updated 4 years ago
- β30Updated 3 years ago
- β21Updated last year