☆20Mar 6, 2015Updated 11 years ago
Alternatives and similar repositories for CVE-2015-1474_poc
Users that are interested in CVE-2015-1474_poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- CVE-2014-4321 exploit☆21Mar 8, 2015Updated 11 years ago
- ☆23Nov 16, 2015Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆94Jan 27, 2015Updated 11 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- ☆32Aug 24, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- BlackHat Asia 2017 talk☆34Mar 30, 2017Updated 8 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- BSidesVienna Homepage☆16Mar 4, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- ☆74Nov 22, 2015Updated 10 years ago
- GDB fork targetting Android/Fennec development☆35May 12, 2014Updated 11 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- A tool that uses your iPhone or iPod Touch's AES engine to calculate keys/ivs for IPSW files.☆24Feb 21, 2014Updated 12 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Tools to work with 23andMe and AncestryDNA raw files☆12Aug 5, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Dec 31, 2018Updated 7 years ago
- Samsung Remote Code Execution as System User☆127Sep 22, 2016Updated 9 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆88Apr 3, 2017Updated 8 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- Utilities for devices based on MediaTek chipsets.☆16Nov 28, 2012Updated 13 years ago
- ☆15Nov 23, 2015Updated 10 years ago