Skip to content
View pl4int3xt's full-sized avatar
:octocat:
Hacking
:octocat:
Hacking

Block or report pl4int3xt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
pl4int3xt/README.md

Meet pl4int3xt 🕶️💻

Learning Reverse engineering, Fuzzing Android Kernel and Exploiting Android Apps

Pinned Loading

  1. CVE-2024-0044 CVE-2024-0044 Public

    CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13

    Python 257 59

  2. AutoDrozer AutoDrozer Public

    Auto Drozer a tool designed to automate the usage of Drozer with a custom commands.yml file

    Python 2

  3. CVE-2021-4045 CVE-2021-4045 Public

    🔐 "PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (<= v1.1.16 Build 211209)" 🔓

    Python 4 2

  4. deepxtract deepxtract Public

    Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes and mimeTypes

    Go 7

  5. rustcrypt rustcrypt Public

    RustCrypt: Because even your files need a good, old-fashioned cloak-and-dagger routine! This Rust tool encrypts and decrypts files like a secret agent with a taste for code-breaking. Your data's ne…

    Rust 2

  6. Inverse Inverse Public

    Kinetic: Igniting Gaming Passion with Jetpack Compose App, Harnessing the Rawg API, and Embracing MVVM Clean Architecture for a Thrilling Gaming Exploration!

    Kotlin 2