robertmillan / mkbreakLinks
Generic exploit for master key vulnerability in Android
☆33Updated 10 years ago
Alternatives and similar repositories for mkbreak
Users that are interested in mkbreak are comparing it to the libraries listed below
Sorting:
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 11 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆108Updated 10 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- Tool used for dumping memory from Android devices☆68Updated 10 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- ☆48Updated 10 years ago
- ☆44Updated 10 years ago
- dropbox of random test code...☆33Updated 9 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 9 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 11 years ago
- Android File Fuzzing Framework☆87Updated 3 years ago
- ☆22Updated 6 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- CVE-2015-2231 POC☆10Updated 10 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- JEB Scripts☆21Updated 10 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 8 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 8 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆16Updated 10 years ago