lntrx / CVE-2021-28663Links
A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
☆123Updated 4 years ago
Alternatives and similar repositories for CVE-2021-28663
Users that are interested in CVE-2021-28663 are comparing it to the libraries listed below
Sorting:
- Research related☆89Updated 3 years ago
- ☆61Updated 8 months ago
- ☆104Updated 5 years ago
- ☆170Updated 5 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆233Updated 5 years ago
- USB device fuzzing on Android Phone☆32Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆67Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated 2 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆68Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆247Updated 5 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 1…☆28Updated 4 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆86Updated 4 years ago
- Static Binary Instrumentation☆122Updated 4 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 6 years ago
- ☆91Updated 2 years ago
- ☆31Updated last year
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Updated 3 years ago
- qemu vulnerablity.☆54Updated 4 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Updated 3 years ago
- CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)☆34Updated 4 years ago
- ☆55Updated 3 years ago
- ☆145Updated 3 years ago
- ☆34Updated 4 years ago
- ☆98Updated 2 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆96Updated last year
- REVerse ENGineering Environment☆62Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- ☆11Updated 3 years ago
- CTF Write-ups☆29Updated 4 years ago