Initial Collection of HackingTeam Exploits
☆93Jul 7, 2015Updated 10 years ago
Alternatives and similar repositories for hackingteam_exploits
Users that are interested in hackingteam_exploits are comparing it to the libraries listed below
Sorting:
- ☆79May 13, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- IDA python script to dynamically dump DEX in memory☆143May 11, 2016Updated 9 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- ☆27Oct 21, 2016Updated 9 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- Disables FBE, proca, Vaultkeeper and auto-reflash of stock recovery on Samsung Pie devices, TESTED on S10, N10, A10 - A50 and Tab A 10.1 …☆12Dec 31, 2021Updated 4 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Marvin-django is the UI/database part of the Marvin project. Marvin is a platform for security analysis of Android apps.☆74Feb 13, 2025Updated last year
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Android Device Testing Framework ("dtf")☆85Dec 26, 2022Updated 3 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Sep 14, 2015Updated 10 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Apr 13, 2016Updated 9 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆253Jun 22, 2020Updated 5 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- ☆34Jul 6, 2015Updated 10 years ago
- A Linux kernel IPC firewall and logger for Android and Binder☆145Feb 12, 2020Updated 6 years ago
- Proof-of-Concept code for exploits☆82May 5, 2016Updated 9 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆85Dec 10, 2017Updated 8 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- Dalvik字节码自篡改原理及实现☆48Jul 10, 2017Updated 8 years ago
- some vul☆789Apr 25, 2025Updated 10 months ago
- A frida based hooking framework for android devices used mainly for app research☆14Mar 25, 2018Updated 7 years ago
- ☆175Aug 16, 2021Updated 4 years ago
- A W.I.P Android Security Ref☆980Mar 24, 2025Updated 11 months ago
- ☆91Feb 22, 2021Updated 5 years ago
- AduitDroid☆120Oct 12, 2016Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago