agg23 / cve-2024-31317Links
Detailed discussion of Zygote vulnerability CVE-2024-31317
☆18Updated 4 months ago
Alternatives and similar repositories for cve-2024-31317
Users that are interested in cve-2024-31317 are comparing it to the libraries listed below
Sorting:
- detailed description on what the system user (in its SELinux context) can access☆19Updated 4 months ago
- Project forked and tweaked to work on Samsung watches nicely - Run commands as system (uid 1000) on Samsung watches! Includes API for pri…☆26Updated 2 years ago
- 🌘 MTK flash tool core written in rust☆85Updated this week
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arb…☆203Updated last year
- CVE-2024-31317☆17Updated 6 months ago
- Extractor: The Android firmware image extraction tool☆117Updated 2 weeks ago
- Dirty Pipe root exploit for Android (Pixel 6)☆24Updated 3 years ago
- system3, Samsung's worst nightmare for a 3rd time!☆176Updated 11 months ago
- Spoof Android package manager installer fields☆100Updated last month
- ☆260Updated last year
- This repository contains magiskboot and mkbootimg based android image kitchen.☆67Updated last month
- A xposed module to bypass protectt.ai in Kotak Neo☆53Updated last year
- Hide Magisk and root system-wide to prevent any kinds of detection☆87Updated 5 years ago
- PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from…☆165Updated last year
- Magisk module to enable adb root☆51Updated last year
- MagiskHide in Zygisk☆87Updated 3 years ago
- Boot image unpacker and repacker while keeping Android Verified Boot.☆103Updated last month
- Toolset which makes possible hiddenly inject code in Android apps through system libraries☆70Updated 4 months ago
- A WebUSB implementation of the Odin protocol for Samsung devices in Download Mode☆18Updated 2 years ago
- LSPosed module to simulate microphone input from an audio file☆60Updated last year
- Android kernel exploitation for CVE-2022-20409☆198Updated last year
- Let's control Secure Boot Chain ourselves.☆87Updated 3 months ago
- ARMv7 payload that provides arbitrary code execution on MediaTek bootloaders☆144Updated last week
- A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models☆81Updated this week
- Let's control MediaTek's bootchain☆363Updated 2 weeks ago
- samsung qualcomm devices loader for EDL Mode☆60Updated last week
- A demo app to detect Zygote injections☆100Updated last week
- Stetho is a debug bridge for Android applications, enabling the powerful Chrome Developer Tools and much more.☆16Updated 7 months ago
- Patch Android vbmeta image and disable verification flags inside☆166Updated 3 years ago
- This is a developing Magisk module for bypassing Android environment detection related to TMLP. The abbreviation "TMLP" stands for anythi…☆55Updated 2 weeks ago