canyie / CVE-2024-0044Links
PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app
☆149Updated 8 months ago
Alternatives and similar repositories for CVE-2024-0044
Users that are interested in CVE-2024-0044 are comparing it to the libraries listed below
Sorting:
- DexDumper based eBPF on Android Platform☆178Updated 4 months ago
- CVE-2024-31317☆42Updated 5 months ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆91Updated last year
- modified HarmonyOS Next emulator,with root permission☆103Updated 7 months ago
- Android Root Zap Framework, Lazy and Powerful :)☆52Updated 2 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆172Updated 11 months ago
- Android-DirtyStream Vuln Demo☆28Updated last year
- 关于Magisk生态的研究☆137Updated last year
- Android Emulator with Newest Security Patch☆27Updated 3 months ago
- A library for runtime Java method interception.☆65Updated 2 weeks ago
- Simple PLT hook for Android☆100Updated 2 months ago
- 主要记入自己复现过的android cve☆48Updated 3 years ago
- Remote library injection into Android processes, then hooking via various methods☆51Updated 3 weeks ago
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arb…☆195Updated 6 months ago
- 个人专用 ONEPLUS 5 内核,做了一些基础的反调试修改(从 maps 隐藏特定 lib,最完整最正常的 tracerPid 修改措施)☆80Updated 3 years ago
- obpo backend server written by golang☆32Updated last year
- aosp sources without prebuilts☆16Updated last year
- A dynamic dex dumper, implemented in rust, no frida.☆135Updated 2 years ago
- Android kernel exploitation for CVE-2022-20409☆185Updated 7 months ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆137Updated 2 months ago
- ☆51Updated 2 years ago
- ☆93Updated 3 years ago
- NEVER EVER DISABLE SELINUX!!!☆22Updated last year
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆58Updated last year
- Run `strace` on program that is under another debugger☆17Updated last year
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆70Updated 2 years ago
- Run command with specific selinux context for Android☆18Updated 2 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆117Updated 3 years ago
- frida runtime resolves smali☆81Updated 3 weeks ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆194Updated 2 years ago