secmob / TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-DevicesLinks
☆172Updated 5 years ago
Alternatives and similar repositories for TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices
Users that are interested in TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices are comparing it to the libraries listed below
Sorting:
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Updated 4 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆234Updated 5 years ago
- Frida-based general purpose fuzzer☆220Updated 5 years ago
- ☆106Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆251Updated 5 years ago
- Research related☆89Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆156Updated 6 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 6 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆353Updated 4 years ago
- ☆61Updated 11 months ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆136Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆127Updated 2 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆90Updated 4 years ago
- ☆32Updated 2 weeks ago
- ☆92Updated 3 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆185Updated 4 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆288Updated 5 months ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Updated 3 years ago
- poc for cve-2020-0022☆67Updated 5 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆100Updated last year
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- ☆58Updated 4 years ago
- Collections of my POCs for android vendor CVEs☆279Updated 2 years ago
- USB device fuzzing on Android Phone☆34Updated 4 years ago
- GDB plugin peda for arm☆146Updated 2 months ago
- ☆76Updated 6 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆158Updated 4 years ago
- CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)☆35Updated 4 years ago