iGio90 / DirtyPipeZ
☆18Updated 2 years ago
Alternatives and similar repositories for DirtyPipeZ:
Users that are interested in DirtyPipeZ are comparing it to the libraries listed below
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 5 years ago
- ☆17Updated 5 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- The Frida based fuzzer all in one☆30Updated 3 years ago
- ☆11Updated 2 years ago
- Frida module utils, writen in typescript☆15Updated last year
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 5 months ago
- ☆13Updated 4 years ago
- IDA Python's idc.py <= 7.3 compatibility module☆21Updated 5 years ago
- JNI Helper Plugin☆52Updated 3 months ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆66Updated 5 years ago
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- ☆39Updated 3 years ago
- ☆27Updated last year
- JNI Helper for IDA 7.4+☆40Updated 6 months ago
- ☆32Updated 5 years ago
- reversing mtk-su☆17Updated 5 years ago
- IDA (sort of) headless☆23Updated last year
- PoC of CVE-2022-20474☆13Updated last month
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- substrate framework for android based on frida☆15Updated 4 years ago
- ☆29Updated 2 years ago
- A bunch of JEB python scripts☆46Updated 3 years ago
- Python 3 bridge to the JEB reverse engineering tool's Python environment☆11Updated 4 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆27Updated 4 years ago