cve2014-3153 exploit for ubuntu x86
☆18Jan 24, 2015Updated 11 years ago
Alternatives and similar repositories for CVE-2014-3153
Users that are interested in CVE-2014-3153 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/it-sec-catalog,new version: https://it-sec-catalog.info/.☆39Apr 24, 2015Updated 10 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2014-3153 aka towelroot☆123Apr 25, 2017Updated 8 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Nov 7, 2017Updated 8 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- This repo will contain scripts, binaries which will speed up the kernel address extraction process☆20Dec 25, 2013Updated 12 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 11 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- 告别意外通话☆18Jan 6, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- ☆11Feb 15, 2016Updated 10 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ☆23Nov 16, 2015Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆12Jun 7, 2018Updated 7 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- afl-fuzz for javascript☆203Feb 11, 2017Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- just like the shell command ls, which is realized by C.☆14Dec 29, 2011Updated 14 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Dive into ELF files using simple self-contained examples☆153Aug 30, 2015Updated 10 years ago
- ☆23Sep 21, 2014Updated 11 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆13Apr 28, 2016Updated 9 years ago
- DeepInspect code release☆11Feb 11, 2020Updated 6 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- CVE-2015-1805 root tool☆278Nov 23, 2017Updated 8 years ago