☆11Feb 15, 2016Updated 10 years ago
Alternatives and similar repositories for CVE-2015-6640
Users that are interested in CVE-2015-6640 are comparing it to the libraries listed below
Sorting:
- ☆16Nov 16, 2015Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- ☆23Nov 16, 2015Updated 10 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆12Jun 7, 2018Updated 7 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- Some files for hacking mach binaries in memory☆18Mar 29, 2015Updated 10 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- Mirror of git://android.git.kernel.org/platform/frameworks/base.git with TaintDroid additions (Mirror lags official Android)☆35Mar 26, 2016Updated 9 years ago
- The droidsec web site!☆171Sep 19, 2024Updated last year
- Android Security☆29Mar 14, 2014Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- A Mach-O Load Command deobfuscator.☆43Nov 25, 2021Updated 4 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Access nearly every directory from within a sandboxed application.☆23Aug 12, 2010Updated 15 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Command line tools I install after jailbreaking☆11Feb 11, 2017Updated 9 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- 百度网盘AI大赛——图像处理挑战赛:手写文字擦除第6名方案(tf版)☆10Feb 10, 2022Updated 4 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- ☆42Jan 12, 2017Updated 9 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Composable high-level instrumentation for C libraries' malloc and friends☆18Nov 15, 2025Updated 3 months ago
- ☆23Nov 18, 2025Updated 3 months ago
- Basic Ember.js visualizations built in D3.☆92Sep 2, 2013Updated 12 years ago
- ☆11Jun 2, 2022Updated 3 years ago
- A simple Android game written in Golang☆12Jan 13, 2015Updated 11 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago