ntiger1024 / easy-android-pwnLinks
A set of Android binary exploitation tasks for beginners.
☆29Updated 6 years ago
Alternatives and similar repositories for easy-android-pwn
Users that are interested in easy-android-pwn are comparing it to the libraries listed below
Sorting:
- The Frida based fuzzer all in one☆30Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆16Updated 2 years ago
- Merge multi binaries into one IDA database.☆24Updated 3 years ago
- some ida script☆34Updated 4 years ago
- ☆12Updated 3 years ago
- A Coverage-Based fuzzing tools☆23Updated 4 years ago
- Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.☆31Updated last year
- 基于angr的污点分析引擎☆42Updated 6 years ago
- qemu vulnerablity.☆54Updated 4 years ago
- iot安全题目学习记录☆16Updated 4 years ago
- IDAPython / IDC tips and tricks☆38Updated 3 years ago
- ☆55Updated 3 years ago
- ☆61Updated 11 months ago
- ☆34Updated 3 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Updated 2 years ago
- ☆65Updated 4 years ago
- ☆44Updated 3 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Updated 3 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 3 years ago
- Debug pwn in docker, no need for virtual machines☆37Updated 2 months ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆98Updated 3 years ago
- A collection of POP exploits.☆30Updated 4 years ago
- ☆103Updated 4 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Updated 2 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆46Updated 4 years ago
- ☆39Updated last year
- ☆30Updated last year
- Symbolic execution engine for Whitespace.☆13Updated 4 years ago