tamirzb / CVE-2019-14040Links
PoC code for CVE-2019-14040
☆27Updated 5 years ago
Alternatives and similar repositories for CVE-2019-14040
Users that are interested in CVE-2019-14040 are comparing it to the libraries listed below
Sorting:
- ☆61Updated 10 months ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- trustonic tbase research☆32Updated 7 years ago
- ☆90Updated 3 years ago
- ☆58Updated 4 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- ☆32Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- Driver Security Analyzer☆53Updated 5 years ago
- android kernel pwn☆20Updated 6 years ago
- ☆41Updated 8 years ago
- ☆34Updated 4 years ago
- USB device fuzzing on Android Phone☆33Updated 4 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 6 years ago
- A IDA plugin to show ARM MSRs nicely☆85Updated 2 years ago
- use for unlock research☆24Updated 2 years ago
- ☆31Updated 4 years ago
- ☆18Updated 5 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- baseband security research☆84Updated 4 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Updated 3 years ago
- ☆18Updated 3 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆68Updated 6 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆30Updated 3 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 9 months ago
- ☆106Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆38Updated 10 years ago
- CTF Write-ups☆29Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago