secmob / CVE-2015-6612Links
☆23Updated 9 years ago
Alternatives and similar repositories for CVE-2015-6612
Users that are interested in CVE-2015-6612 are comparing it to the libraries listed below
Sorting:
- slide and full exploit☆86Updated 4 years ago
- ☆16Updated 9 years ago
- ☆49Updated 9 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- ☆27Updated 9 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- ☆33Updated 10 years ago
- ☆51Updated 8 years ago
- ☆23Updated 10 years ago
- ☆38Updated 9 years ago
- ☆32Updated 7 years ago
- ☆31Updated 9 years ago
- The slides and exploit of mosec2016☆112Updated 9 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- cve2014-3153 exploit for ubuntu x86☆18Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- An Android port of the general purpose honggfuzz fuzzer☆18Updated 10 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆153Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Updated 8 years ago
- Android File Fuzzing Framework☆87Updated 3 years ago
- Running TaintDroid from the command line and analyze output☆17Updated 13 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- ☆79Updated 9 years ago
- Broadcast Intent FUZzing Framework for Android☆81Updated 10 years ago