idl3r / testcodeLinks
dropbox of random test code...
☆33Updated 9 years ago
Alternatives and similar repositories for testcode
Users that are interested in testcode are comparing it to the libraries listed below
Sorting:
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- ☆31Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- Unlock security module, obtain root privilege and so on.☆50Updated 9 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 9 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- CVE-2014-4321 exploit☆21Updated 10 years ago
- ☆74Updated 9 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Updated 8 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- ☆38Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 8 years ago
- slide and full exploit☆86Updated 4 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 9 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- ☆32Updated 7 years ago
- ☆33Updated 10 years ago
- CVE-2015-3636 exploit☆45Updated 9 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Hardened PoC: PaX for Android☆39Updated 4 years ago
- ☆49Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- ☆27Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago