laginimaineb / cve-2014-4322
CVE-2014-4322 Exploit
☆22Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for cve-2014-4322
- ☆38Updated 8 years ago
- ☆27Updated 8 years ago
- cve-2014-4323 poc☆23Updated 9 years ago
- Android Vulnerability Reports and POCs.☆25Updated 7 years ago
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- An Android port of radamsa fuzzer☆64Updated 4 years ago
- ☆31Updated 7 years ago
- ☆31Updated 8 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 6 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 8 years ago
- ☆16Updated 9 years ago
- ☆23Updated 9 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆38Updated 8 years ago
- CVE-2014-4321 exploit☆19Updated 9 years ago
- CVE-2015-2231 POC☆10Updated 9 years ago
- ☆22Updated 10 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆50Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 7 years ago
- Get symbol address and name from tables for kallsyms☆30Updated 8 years ago
- ☆25Updated 6 years ago
- reproduce the experiment in the report.☆27Updated 9 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated last year
- ☆17Updated 10 years ago