☆74Nov 22, 2015Updated 10 years ago
Alternatives and similar repositories for libexploit
Users that are interested in libexploit are comparing it to the libraries listed below
Sorting:
- Get essential address to get root, unlock security, and so on. This is based on android_run_root_shell code.☆81Nov 22, 2015Updated 10 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- ☆580May 30, 2021Updated 4 years ago
- Get symbol address and name from tables for kallsyms☆33Apr 4, 2016Updated 9 years ago
- ☆104Nov 8, 2016Updated 9 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- ☆33Oct 7, 2015Updated 10 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Nov 4, 2012Updated 13 years ago
- Parse and tamper DEX file☆17Dec 12, 2016Updated 9 years ago
- ☆20Mar 6, 2015Updated 10 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- CVE-2014-3153 aka towelroot☆123Apr 25, 2017Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A list of my CVE's with POCs☆681Dec 15, 2020Updated 5 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- ☆14Jun 30, 2015Updated 10 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆12Jun 7, 2018Updated 7 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- An av windows engine with file guard and compress file enumator☆12Aug 25, 2018Updated 7 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- Ida Plugin to Use the Awsome Scylla plugin☆22May 4, 2015Updated 10 years ago
- temporary root for the Galaxy S7 Active☆21Nov 28, 2016Updated 9 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- 一个简单的用于win7 x64的驱动级HIPS☆57Mar 7, 2016Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago