danieljiang0415 / android_kernel_crash_pocLinks
☆19Updated 8 years ago
Alternatives and similar repositories for android_kernel_crash_poc
Users that are interested in android_kernel_crash_poc are comparing it to the libraries listed below
Sorting:
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- ☆32Updated 7 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- ☆28Updated 3 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 9 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- PoC for CVE-2015-6086☆68Updated 9 years ago
- ☆27Updated 9 years ago
- ☆49Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- Some slides from some presentations I have given☆25Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- covFuzz☆34Updated 8 years ago
- ELF header abuse☆48Updated 9 years ago
- ☆49Updated 7 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 9 years ago
- Uncategorized utilities☆57Updated 6 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆14Updated 9 years ago
- ☆25Updated 7 years ago
- ☆26Updated 9 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆84Updated 9 years ago