p1gl3t / CVE-2015-1474_poc
☆20Updated 10 years ago
Alternatives and similar repositories for CVE-2015-1474_poc:
Users that are interested in CVE-2015-1474_poc are comparing it to the libraries listed below
- CVE-2014-4321 exploit☆20Updated 10 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 8 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- An Android port of the general purpose honggfuzz fuzzer☆18Updated 9 years ago
- A place for disclosing things☆42Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- CVE-2014-3153 exploit☆18Updated 9 years ago
- CVE-2015-1805 root tool☆13Updated 5 years ago
- ☆27Updated 8 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- ☆32Updated 8 years ago
- ☆23Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆42Updated 7 years ago
- ☆31Updated 7 years ago
- ☆49Updated 8 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- dropbox of random test code...☆33Updated 9 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- ☆16Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- ☆72Updated 9 years ago
- This repo will contain scripts, binaries which will speed up the kernel address extraction process☆19Updated 11 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- reproduce the experiment in the report.☆27Updated 10 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- ☆11Updated 9 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆84Updated 8 years ago