canyie / CVE-2024-0044View external linksLinks
PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app
☆169Sep 30, 2024Updated last year
Alternatives and similar repositories for CVE-2024-0044
Users that are interested in CVE-2024-0044 are comparing it to the libraries listed below
Sorting:
- Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.☆31Oct 14, 2024Updated last year
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆99Jan 21, 2024Updated 2 years ago
- Code Scanner For Android Privacy☆38Mar 26, 2023Updated 2 years ago
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆329Dec 2, 2024Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆339Apr 12, 2023Updated 2 years ago
- PendingIntent exploit☆11Sep 26, 2023Updated 2 years ago
- CVE-2025-21479 proof-of-concept, I think☆197Aug 16, 2025Updated 6 months ago
- ☆80Oct 12, 2021Updated 4 years ago
- Android Security Bug Queries for CheckMarx☆20Sep 13, 2022Updated 3 years ago
- PoC of CVE-2022-20474☆19Feb 3, 2025Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Jan 31, 2024Updated 2 years ago
- eBPF-Based DexDumper for Android☆363Dec 8, 2025Updated 2 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆537Apr 23, 2024Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆280May 27, 2023Updated 2 years ago
- ☆29May 13, 2025Updated 9 months ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆733Sep 11, 2025Updated 5 months ago
- Open/HarmonyOS abc file parser and decompiler☆123Feb 9, 2026Updated last week
- Android aarch64 kernel rootkit(driver module)☆133Dec 10, 2025Updated 2 months ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆31Apr 16, 2022Updated 3 years ago
- 关于Magisk生态的研究☆160Apr 29, 2024Updated last year
- 计算内存中的libc.so,libart.so的crc与文件中的对比检测apk是否处于异常环境。☆82Dec 13, 2022Updated 3 years ago
- Android kernel exploitation for CVE-2022-20409☆201Oct 17, 2024Updated last year
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆197Jun 15, 2024Updated last year
- obpo backend server written by golang☆33Jul 28, 2023Updated 2 years ago
- An Android Injector aimed to inject through Virtual Space without root permissions☆179Jan 21, 2025Updated last year
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arb…☆205Nov 5, 2024Updated last year
- System Call Hook for ARM64☆212Jan 19, 2026Updated 3 weeks ago
- A library for hiding and retrieving imports in ELF binaries.☆190Apr 18, 2025Updated 9 months ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆40Apr 24, 2025Updated 9 months ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆43Jan 18, 2024Updated 2 years ago
- Some tools when playing with HarmonyOS NEXT☆32Feb 4, 2026Updated last week
- ☆85Sep 19, 2024Updated last year
- eBPF-based lightweight debugger for Android☆754Dec 27, 2025Updated last month
- Dynamic java method hook for Android,Implemented by jvmti☆51Apr 6, 2024Updated last year
- 主要记入自己复现过的android cve☆52Feb 28, 2022Updated 3 years ago
- frida runtime resolves smali☆92Jan 24, 2026Updated 3 weeks ago
- 劫持Zygote在App启动前注入so☆345Jan 22, 2026Updated 3 weeks ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Mar 3, 2022Updated 3 years ago
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago