A tool for enumerating the effective privileges of processes on an Android device.
☆53May 1, 2014Updated 11 years ago
Alternatives and similar repositories for privmap
Users that are interested in privmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- The Android Cluster Toolkit helps organize and manipulate a collection of Android devices.☆109Nov 16, 2015Updated 10 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Cuckoo Sandbox Extension for Android☆76Jan 11, 2015Updated 11 years ago
- Find your router's default password☆14Apr 7, 2015Updated 11 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- ☆13Jun 19, 2017Updated 8 years ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- ☆16May 9, 2016Updated 9 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The droidsec web site!☆171Sep 19, 2024Updated last year
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- The all-in-one boot image tool.☆23Jan 9, 2015Updated 11 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- PowerShell Runspace Connect-Back Shell☆26Dec 31, 2015Updated 10 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆95May 13, 2019Updated 6 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆250Mar 16, 2015Updated 11 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- ☆138Sep 27, 2021Updated 4 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 8 years ago
- An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution☆205Sep 10, 2015Updated 10 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- A dockerized droidbox instance☆25Apr 7, 2016Updated 10 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆113May 7, 2015Updated 10 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- ☆11May 19, 2017Updated 8 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago