Security advisories
☆168May 30, 2016Updated 9 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27May 5, 2016Updated 9 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- Exploit code for CVE-2016-1757☆84Apr 27, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Extended oatdump from AOSP platform/art repo☆137Oct 14, 2017Updated 8 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆253Jun 22, 2020Updated 5 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo☆72Mar 20, 2015Updated 11 years ago
- ☆79May 13, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆25Aug 10, 2018Updated 7 years ago
- Toolkit for binary iOS / OS X sandbox profiles☆146Nov 2, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆28Sep 30, 2020Updated 5 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- CVE-2015-1805 root tool☆278Nov 23, 2017Updated 8 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- Port Scapy to iOS☆28Feb 4, 2014Updated 12 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Change the CID in Samsung eMMC☆189May 12, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Media Fuzzing Framework for Android☆333Apr 1, 2016Updated 9 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆124Aug 13, 2019Updated 6 years ago
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- An application to dynamically inject a shared object into a running process on ARM architectures.☆453Sep 26, 2016Updated 9 years ago