IamAlch3mist / Awesome-Android-Vulnerability-ResearchLinks
☆31Updated 2 months ago
Alternatives and similar repositories for Awesome-Android-Vulnerability-Research
Users that are interested in Awesome-Android-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- Linux & Android Kernel Vulnerability research and exploitation☆51Updated last year
- A collection of PoCs for advanced Linux kernel exploits.☆61Updated this week
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆74Updated last month
- ☆120Updated 2 years ago
- Collection of browser challenges☆137Updated 4 years ago
- ☆238Updated last week
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated last year
- Linux kernel privilege escalation techniques☆139Updated last year
- Everything you need to build and run Linux and Android kernels for exploit development☆94Updated last year
- ☆189Updated last month
- ☆71Updated 2 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆76Updated 3 years ago
- ☆127Updated 8 months ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆74Updated 11 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- Linux Kernel N-day Exploit/Analysis.☆66Updated 9 months ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆42Updated last year
- ☆65Updated last year
- CVE-2022-2586: Linux kernel nft_object UAF☆16Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆84Updated 8 months ago
- CTF pwn problem writeup☆39Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆97Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆40Updated last year
- ☆21Updated 4 months ago
- ☆40Updated last year
- Slides from Off-By-One Conferences☆29Updated 11 months ago
- ☆26Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆116Updated last year
- Disclosures of third party vulnerabilities found by Meta☆29Updated 2 years ago
- A V8 Sandbox Escape Technique.☆23Updated last year