timwr / CVE-2019-2215Links
☆76Updated 6 years ago
Alternatives and similar repositories for CVE-2019-2215
Users that are interested in CVE-2019-2215 are comparing it to the libraries listed below
Sorting:
- ☆107Updated 5 years ago
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆122Updated 6 years ago
- reversing mtk-su☆16Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆251Updated 5 years ago
- Android app for demonstrating native library harnessing☆42Updated 7 years ago
- poc for cve-2020-0022☆67Updated 5 years ago
- Android Unpacking Automation using Corellium Devices☆136Updated 3 weeks ago
- ☆172Updated 5 years ago
- Dump Android Verified Boot Signature☆65Updated 6 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- ☆61Updated 11 months ago
- ☆36Updated 6 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- Automated Frida hook generation with JEB☆152Updated 2 years ago
- This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 1…☆28Updated 4 years ago
- ☆32Updated 6 years ago
- JEB install env☆55Updated 6 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆47Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆140Updated last year
- mtkfb exploit for mt658x & mt6592☆35Updated 10 years ago
- Android Library Code Recognition☆83Updated last year
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- A portable utility to locate android binder service☆97Updated 6 years ago
- Frida FDE bruteforce Samsung S7 Edge☆49Updated 6 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- ☆22Updated 7 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago