michalbednarski / LeakValueLinks
Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()
☆329Updated 2 years ago
Alternatives and similar repositories for LeakValue
Users that are interested in LeakValue are comparing it to the libraries listed below
Sorting:
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆116Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆266Updated 2 years ago
- Collections of my POCs for android vendor CVEs☆273Updated 2 years ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆64Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆150Updated last year
- Android kernel exploitation for CVE-2022-20409☆197Updated last year
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆96Updated last year
- MCP server for JADX-AI Plugin☆210Updated last week
- Dynamic injection tool for Linux/Android☆187Updated 10 months ago
- Python API Monitor for Android apps☆79Updated last year
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆720Updated 2 months ago
- Plugins for reversing android apps in JEB☆77Updated last year
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆355Updated 2 years ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆116Updated last week
- Defeat Java packers via Frida instrumentation☆206Updated 3 years ago
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆317Updated 11 months ago
- A dynamic dex dumper, implemented in rust, no frida.☆146Updated 2 years ago
- Anti-Debug and Anti-Memory Dump for Android☆276Updated 4 years ago
- PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from…☆165Updated last year
- ☆94Updated 3 years ago
- Jadx plugin that shows AI analysis of a method/class in a separate view.☆32Updated last year
- Portable frida injector for rooted android devices.☆206Updated 2 years ago
- Frida scripts for mobile application dynamic-analysis.☆122Updated last year
- Generic Frida Script To Bypass Root Detection☆55Updated 3 years ago
- Deobfuscator for Android Application☆457Updated 3 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆152Updated last year
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆122Updated 6 years ago