secmob / AndroidID-24090395Links
write-what-where plus heap address leaking in OMX
☆36Updated 10 years ago
Alternatives and similar repositories for AndroidID-24090395
Users that are interested in AndroidID-24090395 are comparing it to the libraries listed below
Sorting:
- slide and full exploit☆87Updated 5 years ago
- ☆23Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Updated 10 years ago
- The slides and exploit of mosec2016☆112Updated 9 years ago
- reproduce the experiment in the report.☆28Updated 11 years ago
- ☆27Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 10 years ago
- ☆23Updated 11 years ago
- ☆27Updated 9 years ago
- ☆49Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- ☆16Updated 10 years ago
- CVE-2015-3636 exploit☆45Updated 10 years ago
- cve-2014-4323 poc☆24Updated 10 years ago
- gdb plugin for android debugging☆103Updated 9 years ago
- ☆34Updated 10 years ago
- ☆31Updated 9 years ago
- ☆52Updated 9 years ago
- PoC code for 32 bit Android OS☆135Updated 10 years ago
- An Android port of radamsa fuzzer☆68Updated 6 years ago
- An Android port of the melkor ELF fuzzer☆63Updated 11 years ago
- linux version (rewrite in Python)☆30Updated 10 years ago
- I'll submit the poc after blackhat☆117Updated 10 years ago
- CVE-2014-4321 exploit☆21Updated 10 years ago
- An Online Analysis System for Packed Android Malware☆107Updated 9 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- ☆38Updated 9 years ago
- ☆35Updated 9 years ago
- ☆32Updated 8 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆93Updated 11 years ago