fuhei / CVE-2024-31317Links
CVE-2024-31317
☆54Updated 10 months ago
Alternatives and similar repositories for CVE-2024-31317
Users that are interested in CVE-2024-31317 are comparing it to the libraries listed below
Sorting:
- Android-DirtyStream Vuln Demo☆32Updated last year
- modified HarmonyOS Next emulator,with root permission☆131Updated 11 months ago
- PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from…☆161Updated last year
- Android Root Zap Framework, Lazy and Powerful :)☆52Updated 2 months ago
- ☆50Updated 2 years ago
- 主要记入自己复现过的android cve☆51Updated 3 years ago
- Open/HarmonyOS abc file parser and decompiler☆107Updated last month
- ☆125Updated last week
- Some tools when playing with Android☆17Updated last month
- a demo poc for CVE-2024-0015☆18Updated last year
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆96Updated last year
- a panda executable file decompiler of HarmonyOS Next(鸿蒙反编译器)☆115Updated last month
- obpo backend server written by golang☆33Updated 2 years ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆32Updated 5 months ago
- Inject faults by specifying the address of the T-box or Tyibox in the white-box AES.☆60Updated 3 months ago
- 梆梆加固反调试和root☆87Updated 3 years ago
- 关于Magisk生态的研究☆153Updated last year
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆60Updated last year
- PendingIntent exploit☆10Updated 2 years ago
- A Simple uprobe Hook Framework☆55Updated 6 months ago
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆86Updated 7 months ago
- Run `strace` on program that is under another debugger☆17Updated 2 years ago
- Code Scanner For Android Privacy☆38Updated 2 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆185Updated last year
- NEVER EVER DISABLE SELINUX!!!☆21Updated last year
- ☆144Updated last month
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆42Updated last year
- Android Emulator with Newest Security Patch☆27Updated 7 months ago
- PoC of CVE-2022-20474☆19Updated 8 months ago