arbitraryrw / supersu-patcher
Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break signature based checks.
☆42Updated 3 years ago
Alternatives and similar repositories for supersu-patcher:
Users that are interested in supersu-patcher are comparing it to the libraries listed below
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Dump Android Verified Boot Signature☆60Updated 5 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- ☆21Updated last year
- ☆11Updated 4 years ago
- ☆29Updated 3 years ago
- reversing mtk-su☆17Updated 5 years ago
- ☆32Updated 5 years ago
- My own collection of Frida scripts and tricks☆68Updated 3 years ago
- Android privilege escalation via an use-after-free in binder.c☆38Updated 4 years ago
- Java-layer Android Malware Simplifier☆28Updated 3 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 4 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- Android library for detecting Android virtual containers.☆68Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- ☆18Updated 4 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆31Updated 6 years ago
- DroidGuard VM Samples☆49Updated 2 years ago
- ☆18Updated 2 years ago
- Some crackme i built for Android☆12Updated 4 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- ☆102Updated 4 years ago
- A frida module to parse Elf headers in runtime☆32Updated 5 years ago
- This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 1…☆27Updated 4 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated last year
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago