A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky
☆87Feb 22, 2017Updated 9 years ago
Alternatives and similar repositories for security-advisories
Users that are interested in security-advisories are comparing it to the libraries listed below
Sorting:
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Feb 17, 2016Updated 10 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆69Nov 22, 2018Updated 7 years ago
- ☆79May 13, 2016Updated 9 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Sep 15, 2016Updated 9 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Qualcomm TrustZone kernel privilege escalation☆67Jun 15, 2016Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- Some crazy experiments about using a FPGA to transmit a TV signal old-style☆13Oct 13, 2018Updated 7 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆253Jun 22, 2020Updated 5 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- ☆140Jul 17, 2017Updated 8 years ago
- Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.…☆29Jul 31, 2021Updated 4 years ago
- ☆27May 5, 2016Updated 9 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆77Jan 24, 2016Updated 10 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- CVE-2015-1805 root tool☆278Nov 23, 2017Updated 8 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- Android Device Testing Framework ("dtf")☆85Dec 26, 2022Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- CANToolz - framework for black-box CAN network analysis☆313Oct 31, 2017Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 9 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago