alephsecurity / vulnerabilitiesLinks
Vulnerability Reports by Aleph Research
☆36Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- repo with compromised keys and such☆21Updated 2 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Updated 6 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆22Updated 6 years ago
- ELF header abuse☆48Updated 9 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 7 years ago
- ☆12Updated 8 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- A place for disclosing things☆43Updated 8 years ago
- CVE-2013-6282 exploit☆27Updated 11 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆11Updated 2 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆84Updated 9 years ago
- iOS Frida Scripts☆38Updated 7 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Updated 11 years ago
- Get symbol address and name from tables for kallsyms☆31Updated 9 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- Generic exploit for master key vulnerability in Android☆33Updated 10 years ago
- r2-based tool to decrypt iOS applications☆37Updated 8 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆56Updated 7 years ago
- POC for CVE-2018-4327☆41Updated 6 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 7 years ago
- CVE-2018-4087 PoC☆59Updated 6 years ago