Hcamael / android_kernel_pwnLinks
android kernel pwn
☆20Updated 6 years ago
Alternatives and similar repositories for android_kernel_pwn
Users that are interested in android_kernel_pwn are comparing it to the libraries listed below
Sorting:
- ☆41Updated 7 years ago
- ☆58Updated 5 months ago
- adobe afdko fuzz☆41Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- blog☆16Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- linux system call hook framework☆47Updated 6 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago
- PoC code for CVE-2019-14040☆26Updated 5 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- CTF Write-ups☆29Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 5 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- A new type of js fuzzer☆26Updated 5 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- IoT Security Papers☆48Updated 5 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 5 years ago
- ☆34Updated 3 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- ☆90Updated 2 years ago
- records of my daily sec learning☆13Updated 5 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆9Updated 4 months ago
- by http://whereisk0shl.top/☆35Updated 6 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 9 years ago