o0xmuhe / play_with_oneplus7pro
use for unlock research
☆22Updated last year
Alternatives and similar repositories for play_with_oneplus7pro:
Users that are interested in play_with_oneplus7pro are comparing it to the libraries listed below
- study https://github.com/n132/Libc-GOT-Hijacking☆11Updated last year
- An IDA Pro loader module for Pixel phone bootloader (abl stage), setting correct offsets, fixing function names, adding some C-style stru…☆0Updated 4 months ago
- linux kernel LPE using hw_breakpoint attack tech demo☆25Updated last year
- The Frida based fuzzer all in one☆30Updated 3 years ago
- ☆27Updated last year
- Bring libfuzzer to Unicorn☆26Updated 2 years ago
- IDAPython / IDC tips and tricks☆36Updated 2 years ago
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- ☆16Updated last year
- Merge multi binaries into one IDA database.☆24Updated 3 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 5 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- ☆18Updated 2 months ago
- ☆10Updated 3 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- ☆39Updated 2 years ago
- ☆13Updated 2 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆24Updated 2 years ago
- A unicorn-based dynamic simulation execution IDA plugin☆14Updated 4 years ago
- See https://gitlab.com/pandasauce/qsee-ta-tool for an up-to-date version☆13Updated 6 years ago
- ☆89Updated 3 years ago
- IDA (sort of) headless☆22Updated 11 months ago
- some ida script☆30Updated 3 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- 主要记入自己复现过的android cve☆42Updated 2 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆16Updated 5 years ago
- This is an IDA plugin to recover class information from C++ binary.☆17Updated 4 years ago
- A collection of POP exploits.☆29Updated 3 years ago