jakev / oat2dex-python
Extract DEX files from an ART ELF binary
☆40Updated 8 years ago
Related projects: ⓘ
- Android kernel module to bypass SELinux at boot☆43Updated 8 years ago
- ☆19Updated this week
- CVE-2014-4322 Exploit☆21Updated 8 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- ☆33Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆11Updated 6 years ago
- CVE-2014-4321 exploit☆19Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- ☆39Updated this week
- CVE-2015-3636 exploit☆43Updated 8 years ago
- ☆43Updated this week
- ☆92Updated this week
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- Get symbol address and name from tables for kallsyms☆30Updated 8 years ago
- ☆27Updated 8 years ago
- An Android port of radamsa fuzzer☆64Updated 4 years ago
- mtkfb exploit for mt658x & mt6592☆32Updated 9 years ago
- ☆21Updated this week
- SEAndroid Analytics Library for live device analysis☆58Updated 5 years ago
- Unofficial port of setools to Android☆26Updated 7 years ago
- ☆71Updated 8 years ago
- ☆31Updated 8 years ago
- ☆34Updated this week
- ☆33Updated 9 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 8 years ago
- ☆27Updated 7 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 8 years ago
- ☆16Updated 8 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago