0x742 / CVE-2020-0082-ExternalVibration
This repo contains a proof-of-concept for π±ππβ‘, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.
β27Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0082-ExternalVibration:
Users that are interested in CVE-2020-0082-ExternalVibration are comparing it to the libraries listed below
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)β22Updated 6 years ago
- β102Updated 4 years ago
- Android privilege escalation via an use-after-free in binder.cβ38Updated 4 years ago
- β17Updated 5 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecryptoβ16Updated 3 years ago
- The Android Agent for the Mercury Security Assessment Framework.β10Updated 4 years ago
- β32Updated 5 years ago
- Android Malware Trackerβ27Updated 10 months ago
- β27Updated last year
- A bunch of JEB python scriptsβ46Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Appsβ18Updated 4 years ago
- β29Updated 2 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0β18Updated 5 years ago
- β30Updated 4 months ago
- My own collection of Frida scripts and tricksβ67Updated 3 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted deviceβ39Updated 4 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break siβ¦β42Updated 3 years ago
- A smali emulator.β24Updated 6 years ago
- USB device fuzzing on AndroidΒ Phoneβ31Updated 3 years ago
- Official Dexcalibur documentationβ16Updated 3 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)β118Updated 3 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidraβ11Updated 5 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.β17Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)β35Updated last year
- β18Updated 2 years ago
- β11Updated 2 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of commandβ21Updated 3 years ago
- A blog about learning how to use the Frida dynamic instrumentation toolkit with Androidβ29Updated 2 years ago
- Small Apps As PoC to Detect Frida With Fridaβ51Updated 2 years ago
- Frida FDE bruteforce Samsung S7 Edgeβ48Updated 5 years ago