fi01 / CVE-2015-3636Links
PoC code for 32 bit Android OS
☆133Updated 9 years ago
Alternatives and similar repositories for CVE-2015-3636
Users that are interested in CVE-2015-3636 are comparing it to the libraries listed below
Sorting:
- I'll submit the poc after blackhat☆116Updated 9 years ago
- CVE-2015-3636 exploit☆45Updated 9 years ago
- ☆74Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- The slides and exploit of mosec2016☆112Updated 9 years ago
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆149Updated 10 years ago
- An Online Analysis System for Packed Android Malware☆108Updated 8 years ago
- CVE-2014-3153 aka towelroot☆121Updated 8 years ago
- gdb plugin for android debugging☆104Updated 9 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 9 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 9 years ago
- Dalvik vm Instrumentation OS☆87Updated 9 years ago
- ☆27Updated 9 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 10 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆95Updated 10 years ago
- Android File Fuzzing Framework☆87Updated 3 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Updated 9 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆153Updated 8 years ago
- ☆49Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 9 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆33Updated 10 years ago
- ☆23Updated 10 years ago
- ☆31Updated 9 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆37Updated 10 years ago
- ☆23Updated 9 years ago