michalbednarski / LeakValueLinks
Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()
☆330Updated 2 years ago
Alternatives and similar repositories for LeakValue
Users that are interested in LeakValue are comparing it to the libraries listed below
Sorting:
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆117Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆270Updated 2 years ago
- Collections of my POCs for android vendor CVEs☆273Updated 2 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆64Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆101Updated last year
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆96Updated last year
- Android kernel exploitation for CVE-2022-20409☆197Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆151Updated last year
- Dynamic injection tool for Linux/Android☆192Updated 11 months ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆721Updated 2 months ago
- MCP server for JADX-AI Plugin☆222Updated this week
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆318Updated last year
- Python API Monitor for Android apps☆82Updated last year
- Deobfuscator for Android Application☆460Updated 3 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆357Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆208Updated this week
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from…☆165Updated last year
- Portable frida injector for rooted android devices.☆207Updated 2 years ago
- Anti-Debug and Anti-Memory Dump for Android☆277Updated 4 years ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆138Updated last month
- Plugins for reversing android apps in JEB☆77Updated last year
- A dynamic dex dumper, implemented in rust, no frida.☆151Updated 2 years ago
- ☆94Updated 3 years ago
- CVE-2025-21479 proof-of-concept, I think☆176Updated 3 months ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆154Updated last year
- ☆85Updated 4 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- A Collection of Android (Samsung) Security Research References☆456Updated 4 months ago