Android/Linux vmlinux loader
☆352Nov 18, 2023Updated 2 years ago
Alternatives and similar repositories for droidimg
Users that are interested in droidimg are comparing it to the libraries listed below
Sorting:
- ☆567May 30, 2018Updated 7 years ago
- A list of my CVE's with POCs☆681Dec 15, 2020Updated 5 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆252Jun 22, 2020Updated 5 years ago
- some vul☆789Apr 25, 2025Updated 10 months ago
- Fuzzing Android program with american fuzzy lop (AFL)☆333Mar 24, 2018Updated 7 years ago
- IDA script for highlighting and decoding ARM system instructions☆405Sep 28, 2021Updated 4 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Apr 3, 2017Updated 8 years ago
- Android Library Code Recognition☆83Apr 27, 2024Updated last year
- Media Fuzzing Framework for Android☆334Apr 1, 2016Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- ☆63Aug 26, 2017Updated 8 years ago
- IDA Pro/Hexrays plugins☆137Oct 2, 2018Updated 7 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- ☆52Oct 5, 2016Updated 9 years ago
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,686Updated this week
- ☆27May 5, 2016Updated 9 years ago
- A Dynamic Binary Instrumentation framework based on LLVM.☆1,730Feb 20, 2026Updated last week
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆972Jan 7, 2026Updated last month
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆94Aug 6, 2018Updated 7 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- Flexible Register/Instruction Extender aNd Documentation☆563Sep 27, 2022Updated 3 years ago
- Dalvik vm Instrumentation OS☆87May 13, 2016Updated 9 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- 安卓内核提权漏洞分析☆492Apr 27, 2019Updated 6 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- Frida-based general purpose fuzzer☆221Aug 13, 2020Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆253Apr 8, 2020Updated 5 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Oct 10, 2015Updated 10 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago