ucam-cl-dtg / android-vulnerabilities
The androidvulnerabilities.org website and source data
☆22Updated 4 years ago
Alternatives and similar repositories for android-vulnerabilities:
Users that are interested in android-vulnerabilities are comparing it to the libraries listed below
- A place for disclosing things☆43Updated 8 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Android anti-root detection Proof of Concept☆43Updated 9 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆19Updated 11 years ago
- ☆114Updated 7 years ago
- CVE-2013-6282 exploit☆27Updated 11 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 9 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- repo with compromised keys and such☆21Updated 2 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Updated 9 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- ☆24Updated 9 years ago
- ☆91Updated 8 years ago
- ☆48Updated 10 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- Fuzzer☆43Updated 10 years ago