radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
☆94May 13, 2019Updated 6 years ago
Alternatives and similar repositories for dirtycow
Users that are interested in dirtycow are comparing it to the libraries listed below
Sorting:
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆993Feb 3, 2021Updated 5 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) - recowvery fork☆150Jan 23, 2018Updated 8 years ago
- radare2-lldb integration☆62Jan 22, 2019Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆63Aug 21, 2014Updated 11 years ago
- CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow☆271Jan 27, 2017Updated 9 years ago
- CVE-2014-3153 aka towelroot☆123Apr 25, 2017Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Sep 18, 2016Updated 9 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- PoC for Dirty COW (CVE-2016-5195)☆508Mar 16, 2022Updated 3 years ago
- Tools for analyzing hexagon code☆39Jun 22, 2016Updated 9 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- Cycript backend powered by Frida.☆25Jul 7, 2021Updated 4 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- LD_PRELOAD magic for Android's AssetManager☆82Jun 6, 2022Updated 3 years ago
- linux version (rewrite in Python)☆30May 13, 2015Updated 10 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- An Android port of radamsa fuzzer☆68Dec 24, 2019Updated 6 years ago
- A SDK for the creation of analysis tools without obtaining app source code in order to profile runtime performance, examine code coverage…☆203Dec 16, 2018Updated 7 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Nov 28, 2016Updated 9 years ago
- ☆52Oct 5, 2016Updated 9 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Feb 5, 2017Updated 9 years ago
- ☆567May 30, 2018Updated 7 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- The androidvulnerabilities.org website and source data☆21Jul 7, 2020Updated 5 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- A dynamic information flow tracing system for Android☆54Apr 21, 2021Updated 4 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- ☆30May 21, 2017Updated 8 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆312Apr 7, 2023Updated 2 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago