cloudfuzz / android-kernel-exploitationLinks
Android Kernel Exploitation
☆624Updated 3 years ago
Alternatives and similar repositories for android-kernel-exploitation
Users that are interested in android-kernel-exploitation are comparing it to the libraries listed below
Sorting:
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆943Updated 3 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆576Updated 5 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆350Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆840Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆820Updated 4 years ago
- Slide decks from my conference presentations☆364Updated 2 years ago
- ☆562Updated 7 years ago
- repository for kernel exploit practice☆409Updated 5 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆456Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆522Updated last year
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆318Updated 2 years ago
- Use angr in Ghidra☆609Updated last year
- ☆170Updated 5 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆542Updated 3 years ago
- Windows Pwnable Study☆379Updated 3 months ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆233Updated 5 years ago
- Kernel development & exploitation practice environment.☆235Updated 2 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆351Updated last year
- Project Zero Docs and Tools☆790Updated last week
- A Binary Ninja plugin for vulnerability research.☆296Updated last year
- Exploits for Android Binder bug CVE-2020-0041☆247Updated 5 years ago
- A collection of pwn/CTF related utilities for Ghidra☆693Updated last year
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆432Updated 5 months ago
- CTF Reversing Challenges List☆283Updated 6 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆222Updated 2 years ago
- A Collection of Android (Samsung) Security Research References☆444Updated 2 months ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- A collection of links related to VMware escape exploits☆1,471Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆206Updated last year
- some vul☆780Updated 5 months ago