☆12Jun 13, 2016Updated 9 years ago
Alternatives and similar repositories for AndroidKernelExploitationPlayground
Users that are interested in AndroidKernelExploitationPlayground are comparing it to the libraries listed below
Sorting:
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Updated this week
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- repo for ctf☆22Apr 15, 2018Updated 7 years ago
- Python tool to check your Android kernel for missing CVE patches.☆48Aug 19, 2019Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- collection of translation documents.☆16Mar 31, 2019Updated 6 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Nov 27, 2017Updated 8 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Sensors for the datacenter to protect against intruders and high temperatures☆18Sep 13, 2016Updated 9 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Easy to use minimalistic (6Mb in squashfs) linux system (busybox + openssl + wpa_supplicant)☆11Apr 19, 2023Updated 2 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- 2019 Ultimate Guide to Raspberry Pi: Tips, Tricks and Hacks, published by Packt☆14Jan 18, 2023Updated 3 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- The androidvulnerabilities.org website and source data☆21Jul 7, 2020Updated 5 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆36May 15, 2025Updated 10 months ago
- Transform aosp build system to cmake, so aosp native code can be imported to CLion☆10Jan 7, 2019Updated 7 years ago
- Diary of a reverse-engineer☆39Jan 15, 2018Updated 8 years ago