MrW0l05zyn / cve-2024-0044Links
CVE-2024-0044
☆11Updated last year
Alternatives and similar repositories for cve-2024-0044
Users that are interested in cve-2024-0044 are comparing it to the libraries listed below
Sorting:
- Small Apps As PoC to Detect Frida With Frida☆53Updated 3 years ago
- Generate Frida hooks directly from JEB!☆85Updated 2 years ago
- Files used to resolve the r2pay challenge☆53Updated 4 years ago
- ☆52Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆44Updated last year
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆60Updated last year
- you can use frida in jeb !☆46Updated 2 years ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆10Updated last year
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Updated 9 months ago
- Getting better stacks and backtraces in Frida☆53Updated last month
- use frida monitoring android app☆49Updated 6 years ago
- Generic Frida Script To Bypass Root Detection☆56Updated 2 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆67Updated 3 years ago
- obpo backend server written by golang☆33Updated 2 years ago
- DroidGuard VM Samples☆59Updated 3 years ago
- Obfuscated Binaries☆30Updated 2 years ago
- Android Overlay Hijack☆29Updated last year
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆54Updated 2 weeks ago
- Update Frida hooks automatically.☆27Updated 2 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆29Updated 3 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Updated 3 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆64Updated 3 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- Run `strace` on program that is under another debugger☆17Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆90Updated last year
- deobfuscation BR☆53Updated last year
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- a simple tool for easyily dev/debug using frida and write module for agent. (mainly used for android)☆82Updated 2 months ago