restart adbd with root privileges
☆11Oct 21, 2015Updated 10 years ago
Alternatives and similar repositories for rootadb
Users that are interested in rootadb are comparing it to the libraries listed below
Sorting:
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- Retrieves jobs based off criteria submitted and also returns median salary for software engineers for the hiring company.☆21Jan 27, 2026Updated last month
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- IP格式整理脚本☆10Nov 11, 2021Updated 4 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Use black or white list to check if 3rd app have the permission to start the protected Activity☆14Mar 6, 2018Updated 8 years ago
- Unity experiment using geometry, domain, and hull shaders to render bezier curves☆10Oct 16, 2017Updated 8 years ago
- 用python写的一个自动化解析swagger-api接口并发送的脚本☆11Oct 18, 2022Updated 3 years ago
- Prompt your users to donate after `npm install`☆14Jan 10, 2021Updated 5 years ago
- A NFC card reader for Campus card of NEU ( China )☆12Mar 13, 2021Updated 5 years ago
- Dump the saved wifi passwords for windows using regular expressions and python 3☆17Dec 22, 2016Updated 9 years ago
- App和Web逆向算法还原案例源码分享☆16Mar 25, 2022Updated 3 years ago
- Repository of the paper 'CodeQueries: A Dataset of Semantic Queries over Code' published in ISEC 2024☆13Apr 21, 2024Updated last year
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- ☆10Jul 25, 2016Updated 9 years ago
- 自带PlaceHolder和字数限制的一个TextView☆11Mar 3, 2016Updated 10 years ago
- A CNN that recognizes the flower species☆12Mar 5, 2019Updated 7 years ago
- restart adbd with root privileges☆166Nov 16, 2016Updated 9 years ago
- a high performance blockchain☆14Updated this week
- Fast subdomains enumeration tool for penetration testers☆11Jan 31, 2017Updated 9 years ago
- This is the main repository for exVim!☆11Mar 14, 2024Updated 2 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- ☆17Nov 22, 2022Updated 3 years ago
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 7 years ago
- Quiz app created in the Try Ember course☆10Mar 4, 2016Updated 10 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 9 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- Convert an Instruments file into the Gecko Profile Format☆14Oct 8, 2025Updated 5 months ago
- hack tools for android☆11Dec 21, 2019Updated 6 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- Benchmark collection for analysis. The idea is to have a collection of projects in several languages as well as various sast applications…☆12Jan 7, 2021Updated 5 years ago
- ☆38Jul 3, 2017Updated 8 years ago