41yn14 / CVE-2024-0039-ExploitLinks
Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан для образовательных целей.
☆12Updated last year
Alternatives and similar repositories for CVE-2024-0039-Exploit
Users that are interested in CVE-2024-0039-Exploit are comparing it to the libraries listed below
Sorting:
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆76Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated 2 years ago
- Toolset which makes possible hiddenly inject code in Android apps through system libraries☆73Updated 6 months ago
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆326Updated last year
- A Magisk module that simplifies running the Frida server on Android, with easy management commands to download specific versions, enable …☆31Updated 9 months ago
- Extracting unpacked dec files from running application using frida.☆45Updated 2 years ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- A quick and dirty script to bypass SSL pinning of Flutter applications☆41Updated last month
- Stealth patch for Frida, stealth knowledge collection☆115Updated last year
- PoC of using android:name attribute for hooking☆20Updated 4 months ago
- The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently,…☆19Updated 6 months ago
- This contains notes and code for my Troopers23 Beyond Java talk☆23Updated 2 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Portable frida injector for rooted android devices.☆208Updated 2 years ago
- CVE-2025-0087 EoP full PoC☆22Updated 11 months ago
- Dynamic injection tool for Linux/Android☆197Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆278Updated 2 years ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆47Updated last year
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable x86_64 Linux kernels v5.10.x.☆267Updated last month
- https://github.com/frida/frida-python with devkit☆29Updated last month
- Telegram video (mp4) extension manipulation PoC☆96Updated 11 months ago
- Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required☆78Updated last month
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Updated last week
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Updated last year
- exploits for CVE-2024-20017☆140Updated last year
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆42Updated 3 years ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆147Updated last month
- Android Protection Bypass Stuff that I compiled from few resources.☆21Updated 3 years ago