lntrx / CVE-2021-28663
A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
☆116Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-28663
- Research related☆89Updated 2 years ago
- ☆99Updated 4 years ago
- ☆54Updated last year
- USB device fuzzing on Android Phone☆29Updated 3 years ago
- ☆107Updated last year
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆148Updated 2 years ago
- qemu vulnerablity.☆51Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆55Updated 2 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆65Updated 5 years ago
- Linux Kernel N-day Exploit/Analysis.☆61Updated last month
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆119Updated last year
- A collection of browser exploitation codes from Singular Security Lab.☆181Updated last year
- ☆108Updated 2 months ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 5 years ago
- ☆166Updated 4 years ago
- Static Binary Instrumentation☆118Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆69Updated 2 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆109Updated 2 years ago
- ☆11Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago
- A collection of curated resources and CVEs I use for research.☆102Updated 3 years ago
- Kernel Read Write Execute☆85Updated 2 months ago
- CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)☆33Updated 3 years ago
- ☆84Updated 2 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- ☆27Updated 2 years ago