canyie / CVE-2024-23700Links
PoC for CVE-2024-23700, Android slient privilege escalation allow to read/write contacts, SMS, calendar, call log and voicemail, make outgoing calls or answer incoming calls, manipulate call settings, access & control notifications sent by other apps, control nearby devices, record audio, access device identifiers, and bypass background restrict…
☆39Updated this week
Alternatives and similar repositories for CVE-2024-23700
Users that are interested in CVE-2024-23700 are comparing it to the libraries listed below
Sorting:
- Obfuscated Binaries☆32Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- ☆59Updated 2 years ago
- ☆29Updated 7 months ago
- PendingIntent exploit☆11Updated 2 years ago
- monitor svc calls of android☆74Updated 7 years ago
- deobfuscation BR☆53Updated last year
- CVE-2025-21479 proof-of-concept, I think☆192Updated 5 months ago
- obpo backend server written by golang☆33Updated 2 years ago
- ☆61Updated last year
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆197Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- ☆84Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated 2 weeks ago
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆37Updated 2 years ago
- Run `strace` on program that is under another debugger☆18Updated 2 years ago
- frida runtime resolves smali☆91Updated 8 months ago
- Android Overlay Hijack☆29Updated last year
- Getting better stacks and backtraces in Frida☆58Updated 2 months ago
- Root takeover via signature spoofing in KernelSU☆19Updated 2 years ago
- Android eBPF sample☆52Updated 3 years ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 6 months ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆98Updated 2 years ago
- you can use frida in jeb !☆47Updated 3 years ago
- An approach to utilize auditd under Android 6+☆22Updated 7 years ago
- Instruction tracer powered by Frida☆153Updated 7 months ago
- Files used to resolve the r2pay challenge☆55Updated 5 years ago
- A dynamic dex dumper, implemented in rust, no frida.☆152Updated 2 years ago
- PoC exploit for CVE-2025-48543 in C++☆47Updated 3 weeks ago
- a poc implementation arm64 tracer based on simulation☆65Updated 4 years ago