p1gl3t / CVE-2015-1474_poc
☆19Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2015-1474_poc
- CVE-2014-4321 exploit☆19Updated 9 years ago
- Get symbol address and name from tables for kallsyms☆30Updated 8 years ago
- ☆16Updated 8 years ago
- CVE-2014-4322 Exploit☆22Updated 8 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 8 years ago
- ☆23Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 8 years ago
- ☆27Updated 8 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 6 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 7 years ago
- CVE-2015-1805 root tool☆13Updated 5 years ago
- An Android port of the general purpose honggfuzz fuzzer☆17Updated 9 years ago
- A place for disclosing things☆42Updated 8 years ago
- CVE-2015-3636 exploit☆43Updated 8 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- ☆31Updated 8 years ago
- Various presentations and related materials☆7Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆38Updated 8 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 8 years ago
- ☆49Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- CVE-2015-2231 POC☆10Updated 9 years ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Updated 10 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 7 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆65Updated 6 years ago
- cve-2014-4323 poc☆23Updated 9 years ago