CVE-2015-1805 root tool
☆13Oct 26, 2019Updated 6 years ago
Alternatives and similar repositories for iovyroot
Users that are interested in iovyroot are comparing it to the libraries listed below
Sorting:
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- CVE-2014-4321 exploit☆21Mar 8, 2015Updated 10 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- ☆20Mar 6, 2015Updated 10 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- ☆27May 5, 2016Updated 9 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Jan 24, 2016Updated 10 years ago
- Control Flow Graph Scanning for Android☆63May 26, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 9 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- Fuzz testing framework for security research☆30Jun 19, 2014Updated 11 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆23Jul 24, 2013Updated 12 years ago
- A Cuckoo Sandbox Extension for Android☆76Jan 11, 2015Updated 11 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- ☆49Mar 25, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆123Aug 13, 2019Updated 6 years ago