GeneBlue / cve-2014-7911-expLinks
exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;
☆13Updated 9 years ago
Alternatives and similar repositories for cve-2014-7911-exp
Users that are interested in cve-2014-7911-exp are comparing it to the libraries listed below
Sorting:
- ☆21Updated 9 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 10 years ago
- ☆10Updated 9 years ago
- ☆25Updated 9 years ago
- ☆41Updated 8 years ago
- ☆11Updated 6 years ago
- ☆24Updated 8 years ago
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆51Updated 9 years ago
- Android OAT Plugin for JEB☆47Updated last year
- ☆27Updated 8 years ago
- Android Injector☆23Updated 8 years ago
- Inspector server for android☆47Updated last year
- Parse and tamper DEX file☆18Updated 8 years ago
- ElfHooK, reference with boyliang's AllHookInOne project, fix bugs, support android 5/6/7 and aarch64☆30Updated 3 years ago
- ☆12Updated 7 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- android 各种加密算法hook工具☆12Updated 9 years ago
- Inspector client☆16Updated 3 months ago
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago
- ☆31Updated 9 years ago
- JNI Helper Plugin☆53Updated 6 months ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 9 years ago
- ☆17Updated 6 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆43Updated 6 years ago
- 娜迦DEX文件修复程序☆25Updated 7 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- 修改版substrate Hook,使用源码编译成静态库☆14Updated 6 years ago
- ☆9Updated 9 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago