parallelbeings / CVE-2019-14079Links
USB device fuzzing on Android Phone
☆33Updated 4 years ago
Alternatives and similar repositories for CVE-2019-14079
Users that are interested in CVE-2019-14079 are comparing it to the libraries listed below
Sorting:
- ☆61Updated 10 months ago
- ☆31Updated last month
- ☆90Updated 3 years ago
- Research related☆89Updated 3 years ago
- ☆106Updated 5 years ago
- CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)☆35Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- ☆24Updated 2 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- ☆31Updated 3 years ago
- ☆30Updated 2 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆124Updated 2 years ago
- ☆43Updated 3 years ago
- use for unlock research☆24Updated 2 years ago
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆76Updated 10 months ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆121Updated 4 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆65Updated 3 years ago
- ☆32Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆126Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated 2 years ago
- ☆31Updated last month
- ☆11Updated 3 years ago
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆50Updated 2 months ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 6 years ago
- CTF Write-ups☆29Updated 4 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- baseband security research☆84Updated 4 years ago
- I will provide details and pocs for some bugs I found.☆41Updated last year
- Everything you need to build and run Linux and Android kernels for exploit development☆97Updated last year