pFad - Phone/Frame/Anonymizer/Declutterfier! Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

URL: http://github.com/cloudfuzz/android-kernel-exploitation

" rel="stylesheet" href="https://github.githubassets.com/assets/primer-0b53c3bf3393e2ed.css" /> GitHub - cloudfuzz/android-kernel-exploitation: Android Kernel Exploitation
Skip to content

cloudfuzz/android-kernel-exploitation

Repository files navigation

Android Kernel Exploitation

Objective

The objective of this workshop is to get started with kernel vulnerability analsysis and exploitation in Android platform.

Usage

Clone the repository

git clone https://github.com/cloudfuzz/android-kernel-exploitation ~/workshop

Github Pages URL

https://cloudfuzz.github.io/android-kernel-exploitation/

Workshop Stream

Android Kernel Exploitation

Docker for building kernel

# Build the docker image
docker build -t and-build-env .
# Run the docker
docker run -d --rm -it and-build-env
# Get shell in docker image to do further work

Author

Ashfaq Ansari (@HackSysTeam) of CloudFuzz.

CloudFuzz

pFad - Phonifier reborn

Pfad - The Proxy pFad © 2024 Your Company Name. All rights reserved.





Check this box to remove all script contents from the fetched content.



Check this box to remove all images from the fetched content.


Check this box to remove all CSS styles from the fetched content.


Check this box to keep images inefficiently compressed and original size.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy