ScottyBauer / Android_Kernel_CVE_POCs
A list of my CVE's with POCs
☆671Updated 3 years ago
Related projects: ⓘ
- This project contains pocs and exploits for vulneribilities I found (mostly)☆729Updated 5 months ago
- ☆554Updated 6 years ago
- poc or exp of android vulnerability☆401Updated 6 years ago
- BootStomp: a bootloader vulnerability finder☆378Updated 2 years ago
- jemalloc heap exploitation framework☆447Updated 2 years ago
- binary patching from Python☆627Updated last year
- Fuzzing Android program with american fuzzy lop (AFL)☆321Updated 6 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆446Updated 9 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆886Updated 2 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆669Updated 5 years ago
- Media Fuzzing Framework for Android☆329Updated 8 years ago
- Metaphor - Stagefright with ASLR bypass☆311Updated 8 years ago
- Cross Platform Kernel Fuzzer Framework☆444Updated 5 years ago
- A tool to help you write binary exploits☆603Updated 5 years ago
- Simplify format string exploitation.☆338Updated 2 years ago
- Repository to train/learn memory corruption on the ARM platform.☆353Updated 7 years ago
- lscan is a library identification tool on statically linked/stripped binaries☆391Updated 3 years ago
- AFL/QEMU fuzzing with full-system emulation.☆624Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆667Updated 3 years ago
- A Return-oriented Programming toolkit☆346Updated 7 years ago
- ☆204Updated this week
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆593Updated last year
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆733Updated 2 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆635Updated last month
- LibZeroEvil & the Research Rootkit project.☆587Updated 2 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,478Updated 2 weeks ago
- My proof-of-concept exploits for the Linux kernel☆1,441Updated 2 years ago
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- ☆301Updated this week
- Security advisories☆167Updated 8 years ago