Verification Validation and Visualization of Security Policy Abstractions
☆45Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for V3SPA
Users that are interested in V3SPA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆32Nov 15, 2017Updated 8 years ago
- SELinux policy analysis tool☆17Jan 12, 2021Updated 5 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆92Sep 18, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆38Jul 4, 2016Updated 9 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Mar 28, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆88Apr 3, 2017Updated 8 years ago
- setools has moved to https://github.com/SELinuxProject/setools☆93Jun 15, 2018Updated 7 years ago
- ☆11May 19, 2017Updated 8 years ago
- ☆42Jan 12, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Dronity, the Trinity syscall fuzzer ported to Android☆43Oct 10, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Flask Permission Management Extension☆11Jul 29, 2021Updated 4 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆52Oct 5, 2016Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- ☆19Mar 24, 2017Updated 9 years ago
- Client-side collector for the Android Census☆16Mar 17, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- tool for statically reconstructing the IOKit classes hierarchy from iOS kernelcache dumps☆109Jul 4, 2016Updated 9 years ago
- Android app analysis and feature extraction library☆226Sep 30, 2020Updated 5 years ago
- A Linux kernel IPC firewall and logger for Android and Binder☆145Feb 12, 2020Updated 6 years ago
- Result of the Android security research☆17Feb 16, 2017Updated 9 years ago
- ☆27May 5, 2016Updated 9 years ago