lntrx / CVE-2021-28663Links
A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
☆123Updated 3 years ago
Alternatives and similar repositories for CVE-2021-28663
Users that are interested in CVE-2021-28663 are comparing it to the libraries listed below
Sorting:
- Research related☆89Updated 3 years ago
- ☆60Updated 6 months ago
- ☆103Updated 5 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated last year
- Repository of the findings found by wtf when fuzzing IDA75.☆88Updated 3 years ago
- ☆173Updated 4 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- Static Binary Instrumentation☆121Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Updated 2 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆229Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆241Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆71Updated 5 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆92Updated last year
- Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM☆172Updated 2 months ago
- ☆30Updated last year
- CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)☆36Updated 4 years ago
- ☆11Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- CTF Write-ups☆29Updated 4 years ago
- ☆34Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆98Updated 2 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 6 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Updated 3 years ago
- ☆41Updated 2 years ago
- ☆73Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆197Updated 2 years ago