A local Android DoS Exploit for API 29 and API 30
☆64Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for StartFlagExploit
Users that are interested in StartFlagExploit are comparing it to the libraries listed below
Sorting:
- Library intended to hook Binder interface and manipulate events☆117Sep 28, 2022Updated 3 years ago
- Project for bypass requirement for register Android components like Activities in the AndroidManifest.xml☆97May 15, 2020Updated 5 years ago
- An app intended for fuzzing the Android Binder interface and System Services☆117Sep 2, 2020Updated 5 years ago
- A linux / android / MacOS hooking framework☆119Jun 12, 2022Updated 3 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- Hack Android Runtime (ART) using chickenhook☆27Dec 26, 2019Updated 6 years ago
- Android API restriction bypass for all Android Versions☆736Sep 29, 2025Updated 5 months ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Dec 19, 2019Updated 6 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Write java hook with frida☆54Jun 7, 2020Updated 5 years ago
- ☆18Jul 28, 2021Updated 4 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- A practice for kotlin.☆11Mar 12, 2019Updated 7 years ago
- This project is intended to do some penetration tests of Android system services☆25Oct 29, 2022Updated 3 years ago
- ☆13Jul 29, 2020Updated 5 years ago
- 基于Xposed Hook敏感API☆14Mar 11, 2022Updated 4 years ago
- modify binary AndroidManifest.xml☆41Oct 24, 2024Updated last year
- Instrument code to trace memory☆19Feb 15, 2019Updated 7 years ago
- This is a IDA plugin that integrates several modules of miasm☆23Nov 3, 2020Updated 5 years ago
- ☆16May 15, 2020Updated 5 years ago
- 《Java加密与解密的艺术》第2版☆12Jan 17, 2019Updated 7 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last week
- ☆75May 15, 2019Updated 6 years ago
- Android rootkit☆44Mar 21, 2016Updated 10 years ago
- ☆20Mar 13, 2018Updated 8 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- 抓取应用 ImageView 中的图片☆18Feb 2, 2024Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- Simple Android ARM&ARM64 GOT Hook☆37Jun 8, 2022Updated 3 years ago
- RecyclerView左滑拖拽加载☆21Jul 7, 2020Updated 5 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Jetpack Compose page navigator & stack☆24Dec 16, 2025Updated 3 months ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- ☆20Aug 29, 2022Updated 3 years ago