There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Included is a python script that generates an MP4 exploiting the ‘stsc’ vulnerability otherwise known as CVE-2015-1538 (#1). This is one of the most critical vulnerabilities I reported in the Stagefright library. The expected result of the exploit is a reverse shell as the media user. As detailed in my Black Hat and DEF CON presentations, this user also has access to quite a few groups such as inet, audio, camera, and mediadrm. These groups allow an attacker to take pictures or listen to the microphone remotely without exploiting additional vulnerabilities. This exploit has several caveats. First, it is not a generic exploit. It's only been tested to work on a single device model. My target was the Galaxy Nexus device running Android 4.0.4 containing only a partial implementation of ASLR. Also, due to variances in heap layout, this is not a 100% reliable exploit by itself. However, I was able achieve 100% reliability when delivered through an attack vector that allowed multiple attempts. Finally, this vulnerability was one of several that was neutered by GCC 5.0’s ‘new[]’ integer overflow mitigation present on Android 5.0 and later. Enjoy! Please consider contributing to Android security through research!
asus-cmd
ASUS Router infosvr UDP Broadcast root Command Executionandroid-cluster-toolkit
The Android Cluster Toolkit helps organize and manipulate a collection of Android devices.lk-reducer
Linux Kernel Source Tree Reducerchallack
Proof-of-concept exploit code for CVE-2016-5696canhazaxs
A tool for enumerating the access to entries in the file system of an Android device.privmap
A tool for enumerating the effective privileges of processes on an Android device.VulnWebView
addjsif
Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)file-dissect
File Dissect is a cross-platform framework and UI for analyzing various file formats. It is based on wxWidgets since it provides a native feel regardless of base OS.harry_potter
Write-up and such for the 2014 Plaid CTF harry_potter exploitation challengesocks_scan
Unoriginally named SOCKS proxy scanner from the days of old (2002)nsc
A netcat clone using libnsockjfap
A simple 802.11 fake access point that supports open authcsw-slides-2024
Slides for Developing Secure Software in 2024 at CanSecWestnsock
Ninja Socket Libraryinsomnihack-2015-teaser
My challenge solutions for Insomni'Hack Teaser 2015libircii
A C library for parsing IrcII protocoljduck.github.com
Personal sitechrome-bookmark-del-fix
A tool to patch Chrome's resources.pak to fix an annoying bug in the bookmark manageryez
A tiny raw-irc program using libnsock/libirciiLove Open Source and this site? Check out how you can help us