scoty755 / libping_unhash_exploit_POC
☆43Updated this week
Related projects: ⓘ
- ☆27Updated 8 years ago
- ☆49Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 8 years ago
- ☆39Updated this week
- slide and full exploit☆86Updated 3 years ago
- cve-2014-4323 poc☆23Updated 8 years ago
- CVE-2014-4321 exploit☆19Updated 9 years ago
- ☆16Updated 8 years ago
- ☆23Updated 8 years ago
- ☆49Updated this week
- ☆31Updated 8 years ago
- ☆33Updated 9 years ago
- The slides and exploit of mosec2016☆112Updated 8 years ago
- ☆21Updated this week
- CVE-2015-3636 exploit☆43Updated 8 years ago
- ☆22Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- SEAndroid Analytics Library for live device analysis☆58Updated 5 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- An Android port of radamsa fuzzer☆64Updated 4 years ago
- ☆38Updated 8 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- reproduce the experiment in the report.☆27Updated 9 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 8 years ago
- ☆32Updated this week
- Broadcast Intent FUZzing Framework for Android☆79Updated 9 years ago
- ☆17Updated 10 years ago
- Get symbol address and name from tables for kallsyms☆30Updated 8 years ago