michalbednarski / LeakValue
Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()
☆282Updated last year
Alternatives and similar repositories for LeakValue:
Users that are interested in LeakValue are comparing it to the libraries listed below
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆237Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆110Updated 2 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆197Updated last year
- Collections of my POCs for android vendor CVEs☆263Updated last year
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆56Updated 8 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆141Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆83Updated 11 months ago
- Android kernel exploitation for CVE-2022-20409☆164Updated 3 months ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆84Updated 11 months ago
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆277Updated last month
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆336Updated last year
- Portable frida injector for rooted android devices.☆188Updated last year
- Some Of Anti-Frida Stuff☆114Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆198Updated 2 years ago
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆202Updated 2 weeks ago
- ☆111Updated last year
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆610Updated 5 months ago
- A Collection of Android (Samsung) Security Research References☆401Updated last week
- ☆73Updated 3 years ago
- Anti-Debug and Anti-Memory Dump for Android☆259Updated 3 years ago
- Frida scripts for mobile application dynamic-analysis.☆107Updated 9 months ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.☆130Updated 2 months ago
- ☆88Updated 2 years ago
- Is a protect Android App anti any attacks and environments.☆330Updated last year
- Frida Android utilities☆251Updated 11 months ago
- A dynamic dex dumper, implemented in rust, no frida.☆126Updated last year
- A modular and extendable Python tool for emulating simple SMALI code.☆84Updated 9 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆482Updated 8 months ago
- Code injection on Android without ptrace☆212Updated 9 months ago
- This script automates the task of patching an apk with frida-gadget☆144Updated 2 years ago