tamirzb / CVE-2019-14040
PoC code for CVE-2019-14040
☆26Updated 5 years ago
Alternatives and similar repositories for CVE-2019-14040:
Users that are interested in CVE-2019-14040 are comparing it to the libraries listed below
- ☆55Updated 3 months ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- ☆56Updated 4 years ago
- trustonic tbase research☆31Updated 7 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- android kernel pwn☆19Updated 6 years ago
- ☆32Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Driver Security Analyzer☆51Updated 4 years ago
- ☆18Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- ☆28Updated last year
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆49Updated 4 years ago
- PoC code for CVE-2019-14041☆12Updated 5 years ago
- ☆11Updated 2 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆67Updated 5 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- ☆89Updated 2 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆28Updated 4 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- A IDA plugin to show ARM MSRs nicely☆83Updated 2 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- ☆31Updated 3 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- ☆42Updated 8 years ago
- Various debugging tools such as %DumpObjects for v8☆54Updated 6 years ago
- ☆32Updated 3 years ago
- ☆28Updated last year