robertmillan / mkbreak
Generic exploit for master key vulnerability in Android
☆33Updated 10 years ago
Alternatives and similar repositories for mkbreak:
Users that are interested in mkbreak are comparing it to the libraries listed below
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- ☆22Updated 6 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 8 years ago
- CVE-2013-2596 exploit for android☆14Updated 11 years ago
- dropbox of random test code...☆33Updated 9 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- CVE-2013-2597 exploit☆12Updated 10 years ago
- CVE-2013-6282 exploit☆27Updated 11 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆15Updated 10 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Updated 11 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 7 years ago
- Source code for the beta release of CobraDroid☆14Updated 5 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- CVE-2014-4321 exploit☆20Updated 10 years ago
- ☆19Updated 8 years ago
- temporary root for the Galaxy S7 Active☆21Updated 8 years ago
- CVE-2015-2231 POC☆10Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆103Updated 9 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated last year
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago