This repo will contain scripts, binaries which will speed up the kernel address extraction process
☆20Dec 25, 2013Updated 12 years ago
Alternatives and similar repositories for helper_tools
Users that are interested in helper_tools are comparing it to the libraries listed below
Sorting:
- CVE-2014-4321 exploit☆21Mar 8, 2015Updated 10 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- gdbperl for Ruby☆46Nov 8, 2016Updated 9 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆93Jan 27, 2015Updated 11 years ago
- ☆33Apr 10, 2016Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- ☆33Oct 7, 2015Updated 10 years ago
- ☆20Mar 6, 2015Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆14Apr 28, 2016Updated 9 years ago
- Unlock security module, obtain root privilege and so on.☆52Apr 10, 2016Updated 9 years ago
- Reverse AIDL tool☆45Apr 1, 2015Updated 10 years ago
- ☆61Feb 8, 2016Updated 10 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 10 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆23Dec 5, 2017Updated 8 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- A TrustedBSD module to control execution of binaries with suid bit set☆38Oct 3, 2014Updated 11 years ago
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆149Jan 27, 2015Updated 11 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- generates random values of standard, built-in JavaScript types for fuzz testing☆30Jan 27, 2021Updated 5 years ago
- ☆27May 5, 2016Updated 9 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago