Stars
Markdown about Papers of Binary Code Similarity Detection
Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.
Detection and sanitization for Acropalypse Now - CVE-2023-21036
Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration
Intentionally vulnerable webview implementions in Android
👀 All-Seeing Eye: Arbitrary File Read Vulnerability in Chrome Versions Prior to 116
LogAI - An open-source library for log analytics and intelligence
Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createFromParcel` serialization mismatch in `OutputConfiguration`
PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta
Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mitigation
CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)
Exploits for Android Binder bug CVE-2020-0041
Bypass Android Do Not Disturb by leveraging the People and Conversations system
Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()
Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system
Proof of concept app for Android permanent denial-of-service vulnerability CVE-2020-0443
This is a library that can bypass the hidden api restriction on Android 9-12.
Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) feature
CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)
The Security Toolkit for LLM Interactions
支持 Cursor 全版本的一键全流程脚本,无限白嫖免费续杯试用,可用 Claude 4,win/mac的ID修改、自动注册替换新账户,实现一键全流程脚本 | 全网免费auto第一个解决自动更换账户后打开Cursor账户自动退出问题