flankerhqd / vendor-android-cves
Collections of my POCs for android vendor CVEs
☆269Updated last year
Alternatives and similar repositories for vendor-android-cves:
Users that are interested in vendor-android-cves are comparing it to the libraries listed below
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆115Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆246Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆299Updated 2 years ago
- ☆172Updated 4 years ago
- Android kernel exploitation for CVE-2022-20409☆180Updated 6 months ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆205Updated last year
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆58Updated last year
- ☆73Updated 3 years ago
- Exploits for Android Binder bug CVE-2020-0041☆234Updated 5 years ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆89Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆89Updated last year
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆63Updated 2 years ago
- ☆118Updated 2 years ago
- Android Security Resources.☆345Updated 5 years ago
- ☆335Updated 8 months ago
- Research related☆87Updated 3 years ago
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆117Updated 5 years ago
- ☆103Updated 5 years ago
- A Collection of Android (Samsung) Security Research References☆417Updated 3 weeks ago
- FANS: Fuzzing Android Native System Services☆252Updated 4 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆572Updated 4 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆345Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆143Updated last year
- PoC Frida script to view Android libbinder traffic☆135Updated 9 months ago
- Defeat Java packers via Frida instrumentation☆200Updated 2 years ago
- A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices☆186Updated last year
- ☆290Updated 2 years ago
- Miscellaneous code☆105Updated last month
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆227Updated 4 years ago
- Frida scripts for mobile application dynamic-analysis.☆111Updated last year