retme7 / CVE-2014-4322_pocView external linksLinks
Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc
☆93Jan 27, 2015Updated 11 years ago
Alternatives and similar repositories for CVE-2014-4322_poc
Users that are interested in CVE-2014-4322_poc are comparing it to the libraries listed below
Sorting:
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆149Jan 27, 2015Updated 11 years ago
- CVE-2014-4321 exploit☆21Mar 8, 2015Updated 10 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- CVE-2014-3153 aka towelroot☆123Apr 25, 2017Updated 8 years ago
- xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo☆72Mar 20, 2015Updated 10 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- linux version (rewrite in Python)☆30May 13, 2015Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Jan 24, 2016Updated 10 years ago
- ☆20Mar 6, 2015Updated 10 years ago
- ☆49Mar 25, 2015Updated 10 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Apr 3, 2017Updated 8 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- A "general-purpose" tracing tool☆39Jun 22, 2015Updated 10 years ago
- This repo will contain scripts, binaries which will speed up the kernel address extraction process☆20Dec 25, 2013Updated 12 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- Media Fuzzing Framework for Android☆334Apr 1, 2016Updated 9 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- Hex-Rays Decompiler Enhanced View☆184Sep 21, 2018Updated 7 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago