ud2 / advisoriesLinks
Security advisories
☆168Updated 9 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- Metaphor - Stagefright with ASLR bypass☆317Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆125Updated 9 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Updated 9 years ago
- An automated NFC fuzzing framework for Android devices.☆141Updated 4 years ago
- ☆137Updated 7 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆89Updated 9 years ago
- ☆164Updated 8 years ago
- ☆79Updated 9 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆252Updated 5 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 10 years ago
- The USB host security assessment tool☆282Updated 6 years ago
- Samsung Remote Code Execution as System User☆125Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- A place for disclosing things☆43Updated 9 years ago
- CVE-2014-3153 aka towelroot☆121Updated 8 years ago
- ☆114Updated 8 years ago
- FRAPL Framework☆152Updated 8 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Updated 8 years ago
- I'll submit the poc after blackhat☆117Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability☆94Updated 6 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 12 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated 3 weeks ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- Initial Collection of HackingTeam Exploits☆93Updated 10 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 3 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆126Updated 10 years ago