airbus-seclab / android_emuroot
Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use google-provided emulator images called Google API Playstore, to help reverse engineers to go deeper into their investigations.
☆130Updated 4 years ago
Alternatives and similar repositories for android_emuroot:
Users that are interested in android_emuroot are comparing it to the libraries listed below
- ☆170Updated 4 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆204Updated last year
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆99Updated 3 years ago
- Android Dex disassembler and Binary Ninja plugin☆60Updated 11 months ago
- This repo aims at providing practical examples on how to use r2frida☆199Updated 4 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- ☆30Updated last year
- Mobile security trainings based on android☆104Updated 4 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆42Updated 3 years ago
- My own collection of Frida scripts and tricks☆68Updated 3 years ago
- Android library for detecting Android virtual containers.☆68Updated 4 years ago
- ☆102Updated 5 years ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆209Updated 10 years ago
- Check Android device security settings☆85Updated 5 years ago
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆118Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 8 months ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆53Updated 4 years ago
- PoC to bypass Android restrictions☆206Updated 6 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- Exploits for Android Binder bug CVE-2020-0041☆231Updated 4 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆137Updated 9 years ago
- Android Unpacking Automation using Corellium Devices☆131Updated 5 years ago
- Android Malware Sandbox☆285Updated last month
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆227Updated 4 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Android malware threats that spread in 2018☆44Updated 6 years ago