anarcheuz / Android-PoCs
☆27Updated 8 years ago
Alternatives and similar repositories for Android-PoCs:
Users that are interested in Android-PoCs are comparing it to the libraries listed below
- ☆23Updated 9 years ago
- ☆49Updated 8 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- ☆31Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- reproduce the experiment in the report.☆27Updated 10 years ago
- slide and full exploit☆86Updated 4 years ago
- ☆38Updated 8 years ago
- ☆22Updated 10 years ago
- An Android port of radamsa fuzzer☆65Updated 5 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- ☆16Updated 9 years ago
- ☆31Updated 8 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- CVE-2014-4321 exploit☆20Updated 10 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆54Updated 8 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- ☆19Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Updated 9 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- ☆28Updated 2 years ago
- ☆27Updated 8 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 8 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 8 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- ☆33Updated 9 years ago