Using CVE-2013-6282 to bypass Samsung kernel module authentication
☆13Dec 21, 2013Updated 12 years ago
Alternatives and similar repositories for bypasslkm
Users that are interested in bypasslkm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- Kernel-level emulation of rdtsc for Mac OS X☆16Mar 15, 2015Updated 11 years ago
- Android app to bypass SSL certificate validation (Certificate Pinning).☆16Feb 7, 2016Updated 10 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Updated this week
- Automatic regression verification for LLVM programs☆19Jul 16, 2021Updated 4 years ago
- CVE-2013-6282 proof of concept for Android☆21Dec 19, 2016Updated 9 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- ☆16Apr 4, 2016Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- ☆20Mar 6, 2015Updated 11 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Feb 17, 2016Updated 10 years ago
- an iOS tweak that neutralises jailbreaking detection as well as other anti-debugging mechanisms,☆10Dec 2, 2012Updated 13 years ago
- Collection of syzkaller bug reproducers for Linux☆44May 16, 2022Updated 3 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 10 years ago
- ☆27May 5, 2016Updated 9 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- An OS X kernel module that protects a userland process from being terminated in any way☆14Dec 7, 2015Updated 10 years ago
- Utilities for devices based on MediaTek chipsets.☆16Nov 28, 2012Updated 13 years ago
- Xposed module for obtaining SQLCipher crypto keys☆39Dec 6, 2017Updated 8 years ago
- Dumper☆12Jan 17, 2015Updated 11 years ago
- ☆73Oct 15, 2014Updated 11 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆92Sep 18, 2016Updated 9 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆38Nov 16, 2015Updated 10 years ago
- Exploit code for CVE-2016-1757☆84Apr 27, 2016Updated 9 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Windows设备驱动开发 光盘(示例代码)☆10Jan 14, 2013Updated 13 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆169Apr 25, 2019Updated 6 years ago
- ☆22Apr 16, 2017Updated 8 years ago
- AnyWebView / Any WebView is OK!☆10Oct 21, 2023Updated 2 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 10 years ago