jduck / CVE-2015-3636-fi01
PoC code for 32 bit Android OS
☆8Updated 9 years ago
Related projects: ⓘ
- Vulnerability research and development.☆25Updated 9 years ago
- ☆23Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆51Updated 10 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆65Updated 5 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 7 years ago
- HitCon 2015 spartan 0day & exploit☆26Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- slide and full exploit☆86Updated 3 years ago
- Fuzzer☆43Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- A multi-codec media fuzzing tool.☆42Updated 11 years ago
- ☆49Updated this week
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆53Updated 8 years ago
- ☆21Updated this week
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- ☆33Updated this week
- ☆19Updated 7 years ago
- ☆51Updated 7 years ago
- ☆27Updated 8 years ago
- ☆39Updated this week
- cve-2014-4323 poc☆23Updated 8 years ago
- ☆29Updated this week
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 6 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- ☆16Updated 8 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- ☆31Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago