jhector / armhook-coreLinks
Core of Linux hooking engine for ARM architecture
☆22Updated 7 years ago
Alternatives and similar repositories for armhook-core
Users that are interested in armhook-core are comparing it to the libraries listed below
Sorting:
- A dynamic information flow tracing system for Android☆54Updated 4 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 10 years ago
- CVE-2015-3636 exploit☆45Updated 9 years ago
- Linux hooking engine for ARM architecture☆16Updated 10 years ago
- ☆74Updated 9 years ago
- ☆27Updated 8 years ago
- An Android port of the general purpose honggfuzz fuzzer☆18Updated 10 years ago
- ☆33Updated 10 years ago
- ☆27Updated 9 years ago
- ☆38Updated 9 years ago
- A shared libraries injection tool.☆128Updated 10 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 11 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- ☆31Updated 9 years ago
- Patches to the Nexus 6 (Shamu) kernel source to allow KGDB over serial debug cable☆32Updated 6 years ago
- The slides and exploit of mosec2016☆113Updated 9 years ago
- ☆23Updated 10 years ago
- PoC code for 32 bit Android OS☆132Updated 9 years ago
- gdb plugin for android debugging☆104Updated 9 years ago
- CVE-2014-4321 exploit☆21Updated 10 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- Huawei mate 7 TrustZone exploit☆110Updated 10 years ago
- some idapython scripts for android debugging.☆45Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- slide and full exploit☆87Updated 5 years ago
- ELF obfuscator☆68Updated 10 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- write-what-where plus heap address leaking in OMX☆36Updated 9 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago