retme7 / My-Slides
My slides
☆89Updated 5 years ago
Alternatives and similar repositories for My-Slides
Users that are interested in My-Slides are comparing it to the libraries listed below
Sorting:
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 9 years ago
- ☆38Updated 8 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- ☆31Updated 9 years ago
- ☆27Updated 8 years ago
- wnagzihxa1n's blog☆25Updated 4 months ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- ☆17Updated 6 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- ☆56Updated 4 months ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- android kernel pwn☆19Updated 6 years ago
- slide and full exploit☆86Updated 4 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- Fuzzing framework for third part library of android system☆22Updated 8 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆89Updated 2 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- ☆41Updated 7 years ago
- Git copy of idapython svn repo: https://code.google.com/p/idapython/☆49Updated 10 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- ☆20Updated 6 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆65Updated 5 years ago