droidsec / canhazaxs
A tool for enumerating the access to entries in the file system of an Android device.
☆8Updated 11 years ago
Alternatives and similar repositories for canhazaxs
Users that are interested in canhazaxs are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 10 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- ☆23Updated 9 years ago
- ☆23Updated 10 years ago
- ☆19Updated 11 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- ☆44Updated 10 years ago
- Running TaintDroid from the command line and analyze output☆17Updated 13 years ago
- ☆27Updated 8 years ago
- The droidsec web site!☆171Updated 7 months ago
- ☆51Updated 8 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- ☆38Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 8 years ago
- ☆33Updated 9 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Updated 7 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Updated 10 years ago
- ☆49Updated 8 years ago
- Various presentations and related materials☆7Updated 9 years ago
- ☆21Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Updated 7 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- cve2014-3153 exploit for ubuntu x86☆18Updated 10 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago