A tool for enumerating the effective privileges of processes on an Android device.
☆53May 1, 2014Updated 11 years ago
Alternatives and similar repositories for privmap
Users that are interested in privmap are comparing it to the libraries listed below
Sorting:
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- The Android Cluster Toolkit helps organize and manipulate a collection of Android devices.☆109Nov 16, 2015Updated 10 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Jun 14, 2015Updated 10 years ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- A Cuckoo Sandbox Extension for Android☆76Jan 11, 2015Updated 11 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- ☆13Jun 19, 2017Updated 8 years ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- ☆16May 9, 2016Updated 9 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- The droidsec web site!☆171Sep 19, 2024Updated last year
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- The all-in-one boot image tool.☆23Jan 9, 2015Updated 11 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆94May 13, 2019Updated 6 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆250Mar 16, 2015Updated 11 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- ☆138Sep 27, 2021Updated 4 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 7 years ago
- An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution☆205Sep 10, 2015Updated 10 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- A dockerized droidbox instance☆25Apr 7, 2016Updated 9 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- ☆11May 19, 2017Updated 8 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- ☆12Jun 13, 2016Updated 9 years ago