imlzq's repositories
aarch64-linux-android-4.9
Cloned from https://android.googlesource.com/platform/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9
afl-other-arch
AFL, with scripts to support other architectures.
afl-unicorn
afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.
android-vuln
安卓内核提权漏洞分析
Async_Exp
异步并发通用工具,主要发现异步并发漏洞。如短信炸弹发送间隔限制突破等等~
awesome-iot-hacks
A Collection of Hacks in IoT Space so that we can address them (hopefully).
bindump4j
A portable utility to locate android binder service
BlueCrawl
Frida (Android) Script for extracting bluetooth information
Browser-Fuzz-Summarize
Browser Fuzz Summarize / 浏览器模糊测试综述
byob
BYOB (Build Your Own Botnet)
CVE-2020-0041
Exploits for Android Binder bug CVE-2020-0041
CVE-2021-28663
A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
fpicker
fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)
Fuzzing101
A GitHub Security Lab initiative https://securitylab.github.com/
ghidra_scripts
Scripts for the Ghidra.
LDD-LinuxDeviceDrivers
Linux内核与设备驱动程序学习笔记
macOS-iOS-system-security
macos/ios exploit writeup
mclf-ghidra-loader
Ghidra loader module for the Mobicore trustlet and driver binaries
needle
The iOS Security Testing Framework
samsung-trustzone-research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
SkCodecFuzzer
Fuzzing harness for testing proprietary image codecs supported by Skia on Android
TEE-reversing
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
The-Hitchhiker-s-Guide-to-the-Blockchain-Sec
《区块链安全入门与实战》
vendor-android-cves
Collections of my POCs for android vendor CVEs
vmlinux-to-elf
A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)