alephsecurity / vulnerabilitiesLinks
Vulnerability Reports by Aleph Research
☆35Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Pixel bootlaoder exploit for reading flash storage☆31Updated 9 years ago
- ☆22Updated 7 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- ☆12Updated 9 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Updated 3 years ago
- dropbox of random test code...☆33Updated 10 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Updated 8 years ago
- POC for CVE-2018-4327☆42Updated 7 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Updated 11 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆26Updated 8 years ago
- Shim to grab keystore backed data☆27Updated 8 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Updated 7 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Updated 10 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Updated 9 years ago
- Frida FDE bruteforce Samsung S7 Edge☆50Updated 6 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 8 years ago
- CVE-2013-6282 exploit☆27Updated 12 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Updated 8 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆86Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Updated 8 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Updated 11 years ago
- repo with compromised keys and such☆23Updated 3 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Updated 12 years ago