jltxgcy / CVE_2019_2025_EXPLinks
☆62Updated 5 years ago
Alternatives and similar repositories for CVE_2019_2025_EXP
Users that are interested in CVE_2019_2025_EXP are comparing it to the libraries listed below
Sorting:
- ☆88Updated 4 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- Some reverse-engineering scripts☆115Updated 6 years ago
- unpack UPX on android.☆35Updated 6 years ago
- OLLVM_Deobfuscation is a Python-based ollvm deobfuscation tool, which now has a perfect performance on ollvm confused C / C + + code comp…☆29Updated 5 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- blabla☆50Updated 4 years ago
- IDA_Signsrch in Python☆103Updated 5 years ago
- IDA plugin aid to set android so breakpoint☆33Updated 7 years ago
- ☆59Updated last year
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆28Updated 3 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 5 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆91Updated 7 years ago
- ☆22Updated 6 years ago
- use frida monitoring android app☆49Updated 6 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- ☆36Updated 6 years ago
- Android Root Zap Framework, Lazy and Powerful :)☆52Updated 3 weeks ago
- unicorn demo☆26Updated 4 years ago
- ☆60Updated 8 years ago
- Like-LeGu☆32Updated last year
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- ☆124Updated 5 years ago
- Reverse Engineering about 360 android app guard☆58Updated 5 years ago
- A portable utility to locate android binder service☆95Updated 5 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- ART tracing research☆91Updated 2 years ago
- ☆54Updated 8 years ago
- rewrite dex file☆42Updated 3 years ago