twosixlabs / V3SPAView external linksLinks
Verification Validation and Visualization of Security Policy Abstractions
☆45Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for V3SPA
Users that are interested in V3SPA are comparing it to the libraries listed below
Sorting:
- ☆32Nov 15, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆90Sep 18, 2016Updated 9 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- ☆11May 19, 2017Updated 8 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Apr 3, 2017Updated 8 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Mar 28, 2017Updated 8 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- ☆52Oct 5, 2016Updated 9 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- tool for statically reconstructing the IOKit classes hierarchy from iOS kernelcache dumps☆109Jul 4, 2016Updated 9 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- setools has moved to https://github.com/SELinuxProject/setools☆93Jun 15, 2018Updated 7 years ago
- ☆41Jan 12, 2017Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- A tool for learning bug patterns.☆11Jul 19, 2016Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Oct 10, 2015Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- A Linux kernel IPC firewall and logger for Android and Binder☆145Feb 12, 2020Updated 6 years ago
- Android app analysis and feature extraction library☆227Sep 30, 2020Updated 5 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago