michalbednarski / ReparcelBug
CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)
☆22Updated 6 years ago
Alternatives and similar repositories for ReparcelBug:
Users that are interested in ReparcelBug are comparing it to the libraries listed below
- ☆17Updated 5 years ago
- The Frida based fuzzer all in one☆30Updated 3 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- ☆18Updated 2 years ago
- ☆27Updated last year
- A bunch of JEB python scripts☆46Updated 3 years ago
- ☆11Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- PoC of CVE-2022-20474☆13Updated 2 weeks ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 5 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- ☆12Updated 2 years ago
- ☆55Updated last month
- ☆89Updated 2 years ago
- PoC code for CVE-2017-13253☆39Updated 4 years ago
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 4 years ago
- Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.☆21Updated 4 months ago
- ☆41Updated 10 months ago
- ☆32Updated 5 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- ☆31Updated 3 years ago
- android kernel pwn☆19Updated 6 years ago
- ☆30Updated last year
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆66Updated 5 years ago
- Official Dexcalibur documentation☆16Updated 3 years ago