tamirzb / CVE-2019-14040Links
PoC code for CVE-2019-14040
☆27Updated 5 years ago
Alternatives and similar repositories for CVE-2019-14040
Users that are interested in CVE-2019-14040 are comparing it to the libraries listed below
Sorting:
- ☆61Updated 8 months ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- ☆58Updated 4 years ago
- ☆91Updated 2 years ago
- trustonic tbase research☆32Updated 7 years ago
- ☆34Updated 3 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- ☆41Updated 8 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 6 years ago
- Driver Security Analyzer☆53Updated 4 years ago
- android kernel pwn☆20Updated 6 years ago
- ☆32Updated 5 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆68Updated 6 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆67Updated 3 years ago
- ☆31Updated 4 years ago
- baseband security research☆85Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆103Updated 5 years ago
- A portable utility to locate android binder service☆96Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 7 months ago
- PoC code for CVE-2019-14041☆13Updated 5 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆15Updated 4 years ago
- blog☆16Updated 5 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- exploit code for a bpf heap overflow vulnerability☆28Updated 6 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆11Updated 3 years ago