airbus-seclab / android_emurootView external linksLinks
Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use google-provided emulator images called Google API Playstore, to help reverse engineers to go deeper into their investigations.
☆139Jan 28, 2021Updated 5 years ago
Alternatives and similar repositories for android_emuroot
Users that are interested in android_emuroot are comparing it to the libraries listed below
Sorting:
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆210Nov 1, 2023Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- ☆171Aug 6, 2020Updated 5 years ago
- PoC to bypass Android restrictions☆217Mar 27, 2019Updated 6 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Scripts to unpack APK protected by Legu☆215Apr 11, 2023Updated 2 years ago
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated last week
- tree but for Objective-C messages.☆125Jan 7, 2024Updated 2 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- A plugin to integrate the Frida dynamic instrumentation toolkit into Binary Ninja.☆62Jun 1, 2020Updated 5 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- ☆13Apr 8, 2021Updated 4 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆177Apr 4, 2023Updated 2 years ago
- ☆31Feb 10, 2020Updated 6 years ago
- ☆21Jan 15, 2018Updated 8 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆29Dec 17, 2018Updated 7 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆130Sep 18, 2023Updated 2 years ago
- ARMv7 architecture plugin☆40Mar 7, 2024Updated last year
- Inspect and manipulate UIKit-based GUIs through Frida.☆59Jun 16, 2025Updated 8 months ago
- kernel exploit for Apple iOS 13.X☆185Nov 27, 2020Updated 5 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 7 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- Frida module to hook module initializations on android☆67Jan 4, 2021Updated 5 years ago
- Slides from my conference presentations.☆80Aug 5, 2020Updated 5 years ago
- Dump Android Verified Boot Signature☆66Jun 23, 2019Updated 6 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆202Jul 28, 2021Updated 4 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆20Sep 16, 2023Updated 2 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆47Jul 24, 2021Updated 4 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- Create an outbound stream over a message transport.☆21Jun 16, 2025Updated 8 months ago