Polo35 / CVE-2020-0022Links
CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)
☆35Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0022
Users that are interested in CVE-2020-0022 are comparing it to the libraries listed below
Sorting:
- poc for cve-2020-0022☆67Updated 5 years ago
- ☆106Updated 5 years ago
- USB device fuzzing on Android Phone☆34Updated 4 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Updated 4 years ago
- Research related☆89Updated 3 years ago
- ☆61Updated 11 months ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- ☆92Updated 3 years ago
- ☆31Updated 3 years ago
- ☆31Updated 2 months ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Updated 3 years ago
- ☆11Updated 3 years ago
- Exploits for Android Binder bug CVE-2020-0041☆252Updated 5 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆67Updated 3 months ago
- ☆172Updated 5 years ago
- Collections of my POCs for android vendor CVEs☆280Updated 2 years ago
- CTF Write-ups☆29Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆127Updated 2 years ago
- ☆45Updated 4 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Updated 2 years ago
- baseband security research☆84Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆100Updated 3 years ago
- I will provide details and pocs for some bugs I found.☆41Updated last year
- A set of Android binary exploitation tasks for beginners.☆29Updated 6 years ago
- This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 1…☆28Updated 4 years ago
- Security issues I've reported in Edge☆47Updated 3 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆153Updated 3 years ago
- ☆21Updated 3 years ago
- Some Vulnerability in the some protocol are collected.☆106Updated last year
- ☆24Updated 3 years ago