Security advisories
☆168May 30, 2016Updated 9 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- ☆27May 5, 2016Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo☆72Mar 20, 2015Updated 10 years ago
- ☆79May 13, 2016Updated 9 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Extended oatdump from AOSP platform/art repo☆137Oct 14, 2017Updated 8 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆253Jun 22, 2020Updated 5 years ago
- Toolkit for binary iOS / OS X sandbox profiles☆146Nov 2, 2015Updated 10 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- ☆90Mar 15, 2017Updated 8 years ago
- CVE-2015-1805 root tool☆277Nov 23, 2017Updated 8 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Media Fuzzing Framework for Android☆333Apr 1, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Jan 24, 2016Updated 10 years ago
- Samsung Remote Code Execution as System User☆127Sep 22, 2016Updated 9 years ago
- An application to dynamically inject a shared object into a running process on ARM architectures.☆453Sep 26, 2016Updated 9 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Feb 26, 2026Updated last week
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆123Aug 13, 2019Updated 6 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- ☆48Oct 19, 2015Updated 10 years ago