jduck / canhazaxs
A tool for enumerating the access to entries in the file system of an Android device.
☆66Updated 6 years ago
Alternatives and similar repositories for canhazaxs:
Users that are interested in canhazaxs are comparing it to the libraries listed below
- ☆23Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- ☆31Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆27Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 7 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- ☆33Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆60Updated 10 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 8 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- ☆16Updated 9 years ago
- ☆49Updated 8 years ago
- The slides and exploit of mosec2016☆112Updated 8 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 9 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- The droidsec web site!☆171Updated 5 months ago
- Running TaintDroid from the command line and analyze output☆17Updated 12 years ago
- ☆22Updated 10 years ago
- SEAndroid Analytics Library for live device analysis☆58Updated 5 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- ☆38Updated 8 years ago
- CVE-2014-4321 exploit☆20Updated 9 years ago
- ☆51Updated 8 years ago