a7vinx / CVE-2015-3636Links
Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.
☆18Updated 8 years ago
Alternatives and similar repositories for CVE-2015-3636
Users that are interested in CVE-2015-3636 are comparing it to the libraries listed below
Sorting:
- Exploit code for CVE-2018-9411 for MediaCasService☆51Updated 6 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- mtkfb exploit for mt658x & mt6592☆35Updated 10 years ago
- My slides☆88Updated 5 years ago
- dropbox of random test code...☆33Updated 9 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 8 years ago
- ☆31Updated 9 years ago
- PoC code for CVE-2017-13253☆37Updated 5 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- Binaries compiled for ARM☆71Updated 8 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆85Updated 7 years ago
- A portable utility to locate android binder service☆95Updated 6 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Unlock security module, obtain root privilege and so on.☆52Updated 9 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- ☆105Updated 5 years ago
- Huawei mate 7 TrustZone exploit☆110Updated 10 years ago
- poc for cve-2020-0022☆67Updated 5 years ago
- Android Library Code Recognition☆83Updated last year
- JEB install env☆54Updated 6 years ago
- ☆62Updated 6 years ago
- ☆36Updated 6 years ago
- Arm Episodes☆78Updated 7 years ago
- ☆17Updated 6 years ago
- Automatically exported from code.google.com/p/wifuzz☆35Updated 10 years ago
- poc for cve-2017-10661☆11Updated 8 years ago
- ☆38Updated 9 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆47Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Shellcode, reports of Amazon Echo, which we have presented on Defcon26☆39Updated 7 years ago