airbus-seclab / android_emuroot
Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use google-provided emulator images called Google API Playstore, to help reverse engineers to go deeper into their investigations.
☆124Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for android_emuroot
- ☆166Updated 4 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆197Updated last year
- Mobile security trainings based on android☆103Updated 4 years ago
- This repo aims at providing practical examples on how to use r2frida☆198Updated 3 years ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆205Updated 10 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆43Updated 3 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆98Updated 3 years ago
- Android Dex disassembler and Binary Ninja plugin☆54Updated 6 months ago
- ☆30Updated last year
- My own collection of Frida scripts and tricks☆66Updated 3 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- ☆99Updated 4 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆54Updated 3 years ago
- PoC to bypass Android restrictions☆196Updated 5 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆133Updated 8 years ago
- Android library for detecting Android virtual containers.☆67Updated 3 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆151Updated 3 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆86Updated 3 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆132Updated 3 months ago
- Java-layer Android Malware Simplifier☆26Updated 2 years ago
- A collection of secRet frida scripts☆64Updated 3 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆97Updated 7 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆180Updated 3 years ago
- Exploits for Android Binder bug CVE-2020-0041☆221Updated 4 years ago
- A curated list of awesome baseband research resources☆159Updated 4 years ago
- ☆84Updated 2 years ago
- Detection Rules for Quark Engine. Please use the website below to explore our rules.☆28Updated last year