Ylarod / CVE-2023-5521Links
Root takeover via signature spoofing in KernelSU
☆19Updated 2 years ago
Alternatives and similar repositories for CVE-2023-5521
Users that are interested in CVE-2023-5521 are comparing it to the libraries listed below
Sorting:
- A kernel module for tracing signal☆30Updated 2 years ago
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆36Updated last year
- APatch KernelPatch QEMU Debug Environment☆20Updated last year
- deobfuscation BR☆52Updated last year
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- It can help you better use Frida in SO binaries☆34Updated 2 years ago
- try try full features ebpf on android without Pixel 6☆20Updated 3 years ago
- ☆28Updated 5 months ago
- ☆34Updated 10 months ago
- hwBreakpoint Test App☆19Updated 3 years ago
- NEVER EVER DISABLE SELINUX!!!☆21Updated last year
- ☆17Updated 3 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆22Updated last year
- Android aarch64 kernel rootkit(driver module)☆105Updated last month
- ☆11Updated 8 months ago
- A Project for people to study android svc.☆24Updated 3 years ago
- obpo backend server written by golang☆33Updated 2 years ago
- ☆36Updated last month
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆36Updated 8 months ago
- A Simple uprobe Hook Framework☆63Updated 7 months ago
- Mirror of https://gitee.com/SmartSmallBoy/hardware-breakpoint☆53Updated last year
- Single-step debugging of native code using frida, stalker, and semaphore☆82Updated last year
- monitor svc calls of android☆72Updated 7 years ago
- Android eBPF sample☆50Updated 3 years ago
- 研究内核改机策略☆66Updated last year
- Inotify监听测试☆34Updated 3 years ago
- 使用 frida stalker 实现的 trace☆29Updated 2 years ago
- llvm with customised obfuscation optimisations☆14Updated last year
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆27Updated 2 years ago