Android/Linux vmlinux loader
☆354Nov 18, 2023Updated 2 years ago
Alternatives and similar repositories for droidimg
Users that are interested in droidimg are comparing it to the libraries listed below
Sorting:
- ☆567May 30, 2018Updated 7 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆253Jun 22, 2020Updated 5 years ago
- some vul☆791Apr 25, 2025Updated 10 months ago
- IDA script for highlighting and decoding ARM system instructions☆405Sep 28, 2021Updated 4 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- Unifies ".mdt" and ".bXX" files into a complete Trustlet☆94Aug 6, 2018Updated 7 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- Fuzzing Android program with american fuzzy lop (AFL)☆333Mar 24, 2018Updated 7 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- Media Fuzzing Framework for Android☆333Apr 1, 2016Updated 9 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆88Apr 3, 2017Updated 8 years ago
- ☆64Aug 26, 2017Updated 8 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,698Updated this week
- Android Library Code Recognition☆83Apr 27, 2024Updated last year
- CVE-2015-1805 root tool☆278Nov 23, 2017Updated 8 years ago
- Exploits for Android Binder bug CVE-2020-0041☆255Apr 8, 2020Updated 5 years ago
- ☆51Oct 5, 2016Updated 9 years ago
- A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices☆978Jan 7, 2026Updated 2 months ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- ☆27May 5, 2016Updated 9 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Oct 10, 2015Updated 10 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- IDA Pro/Hexrays plugins☆138Oct 2, 2018Updated 7 years ago
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated 2 years ago
- A Dynamic Binary Instrumentation framework based on LLVM.☆1,742Feb 20, 2026Updated last month
- Flexible Register/Instruction Extender aNd Documentation☆563Sep 27, 2022Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆283May 27, 2023Updated 2 years ago
- Broadcast Intent FUZzing Framework for Android☆80Jun 26, 2015Updated 10 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- 安卓内核提权漏洞分析☆494Apr 27, 2019Updated 6 years ago
- ☆42Jan 12, 2017Updated 9 years ago