airbus-seclab / android_emurootLinks
Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use google-provided emulator images called Google API Playstore, to help reverse engineers to go deeper into their investigations.
☆135Updated 4 years ago
Alternatives and similar repositories for android_emuroot
Users that are interested in android_emuroot are comparing it to the libraries listed below
Sorting:
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated last year
- ☆172Updated 5 years ago
- Mobile security trainings based on android☆106Updated 4 years ago
- Android Dex disassembler and Binary Ninja plugin☆66Updated 2 months ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 4 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆45Updated 4 years ago
- This repo aims at providing practical examples on how to use r2frida☆205Updated 4 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆104Updated 4 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆54Updated 4 years ago
- Android Unpacking Automation using Corellium Devices☆134Updated 4 months ago
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆122Updated 4 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆40Updated 4 years ago
- PoC to bypass Android restrictions☆212Updated 6 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago
- Helper scripts to set up OpenJDK 11 and scale Ghidra for 4K on Ubuntu 18.04 / 18.10☆118Updated 3 months ago
- reversing mtk-su☆17Updated 5 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- Java-layer Android Malware Simplifier☆27Updated 3 years ago
- Check Android device security settings☆86Updated 5 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆230Updated 5 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- A collection of my Ghidra scripts☆98Updated last year
- Patches those pesky APKs for proxy use.☆51Updated 4 years ago
- Android library for detecting Android virtual containers.☆70Updated 4 years ago
- Miscellaneous code☆111Updated 2 months ago