tamirzb / CVE-2019-14040Links
PoC code for CVE-2019-14040
☆26Updated 5 years ago
Alternatives and similar repositories for CVE-2019-14040
Users that are interested in CVE-2019-14040 are comparing it to the libraries listed below
Sorting:
- ☆60Updated 6 months ago
- trustonic tbase research☆31Updated 7 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆71Updated 5 years ago
- ☆58Updated 4 years ago
- android kernel pwn☆20Updated 6 years ago
- Driver Security Analyzer☆52Updated 4 years ago
- ☆90Updated 2 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- ☆32Updated 4 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 5 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- ☆41Updated 8 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- PoC code for CVE-2019-14041☆12Updated 5 years ago
- baseband security research☆84Updated 4 years ago
- ☆30Updated last year
- use for unlock research☆23Updated 2 years ago
- ☆18Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- ☆103Updated 5 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆36Updated 9 years ago
- ☆31Updated 3 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- ☆18Updated 3 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆15Updated 4 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago