fkie-cad / eevaLinks
E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android
☆16Updated last year
Alternatives and similar repositories for eeva
Users that are interested in eeva are comparing it to the libraries listed below
Sorting:
- Everything you need to build and run Linux and Android kernels for exploit development☆92Updated last year
- ☆48Updated last year
- ☆71Updated 2 years ago
- Disclosures of third party vulnerabilities found by Meta☆29Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- ☆29Updated 2 months ago
- ☆32Updated 6 months ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated last year
- ☆120Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆96Updated last year
- ☆60Updated last year
- ☆63Updated last year
- Reverse Engineering and Observability toolkit for Draytek firewalls☆40Updated 4 months ago
- Slides from Off-By-One Conferences☆29Updated 10 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- ☆30Updated last year
- ☆126Updated 8 months ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆73Updated 2 years ago
- A V8 Sandbox Escape Technique.☆21Updated last year
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- ☆45Updated 8 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆114Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆71Updated 10 months ago
- Shielder's public proof of concepts collection☆33Updated 10 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆258Updated 2 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Updated 2 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated last year
- Kernel Read Write Execute☆84Updated 10 months ago