IOActive / AOSP-DownloadProviderHijacker
PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)
☆19Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for AOSP-DownloadProviderHijacker
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆37Updated 2 years ago
- Frida FDE bruteforce Samsung S7 Edge☆47Updated 5 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆14Updated 9 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆10Updated 2 years ago
- ☆11Updated 4 years ago
- ☆18Updated 5 years ago
- Metasploit RPC controller application☆12Updated 6 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 3 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 5 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Worlds first Google Android kernel rootkit as featured at DEF CON 18☆21Updated 9 years ago
- Tool used for dumping memory from Android devices☆66Updated 9 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- ☆13Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- repo with compromised keys and such☆20Updated last year
- Leveraging CVE-2018-19788 without root shells☆18Updated 5 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆43Updated 3 years ago
- iOS malware samples☆36Updated 8 years ago
- A demo app vulnerable to directory traversal☆15Updated 4 years ago
- ☆10Updated 7 years ago
- Generate HID attack strings for Kali Nethunter☆11Updated 9 years ago
- Apple wireless research and tools☆17Updated 4 years ago