Common device tree for the Samsung Galaxy S6
☆10Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for android_device_samsung_zero-common
Users that are interested in android_device_samsung_zero-common are comparing it to the libraries listed below
Sorting:
- DEPRECATED: Monitor Mode and Firmware patching framework for the Google Nexus 5, development moved to: https://github.com/seemoo-lab/nexm…☆78Dec 10, 2022Updated 3 years ago
- ☆76Dec 4, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Jtag parsing scripts☆10Oct 14, 2023Updated 2 years ago
- ARP cache poisoning implementation using Scapy☆13Jul 14, 2019Updated 6 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated 3 weeks ago
- ☆12Feb 24, 2026Updated last week
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆23Jan 23, 2026Updated last month
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- ☆10May 13, 2019Updated 6 years ago
- Tizen ARM for Allwinner Devices☆28Apr 30, 2015Updated 10 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- ☆12May 31, 2018Updated 7 years ago
- ☆15Mar 3, 2022Updated 4 years ago
- Hackquest solutions.☆10Sep 29, 2015Updated 10 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆11Feb 16, 2020Updated 6 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- A generic decorator based ssh protocol message fuzzer based paramiko the Native Python SSHv2 protocol library☆13Jan 2, 2020Updated 6 years ago
- ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more. With repository sta…☆25Updated this week
- FuzzCoAP - Fuzzing for Robustness and Security Testing of CoAP Servers☆12Jun 23, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- aarch64-cortex_a53-linux-gnueabi Toolchain☆11Aug 10, 2018Updated 7 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- ☆18Jan 25, 2017Updated 9 years ago
- ☆16Apr 15, 2019Updated 6 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Braid/aggregate one or more RSS feeds (file or url) into a single feed (RSS or JSON output). Process resulting feed through specified plu…☆13Jun 27, 2018Updated 7 years ago
- A tool to infer the security handshake state machine of a given WiFi router. Useful for vulnerability analysis☆15Oct 19, 2022Updated 3 years ago
- A custom implementation of the Nanomites protection technology for Windows executables (x86 and x64) originally introduced by Silicon Rea…☆33Jan 11, 2026Updated last month
- https://exploit.courses/☆19Apr 14, 2018Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago