michalbednarski / ReparcelBug2
Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createFromParcel` serialization mismatch in `OutputConfiguration`
☆115Updated 3 years ago
Alternatives and similar repositories for ReparcelBug2:
Users that are interested in ReparcelBug2 are comparing it to the libraries listed below
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆88Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆291Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆88Updated last year
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆57Updated 10 months ago
- ☆73Updated 3 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- Files used to resolve the r2pay challenge☆50Updated 4 years ago
- PoC of CVE-2022-20474☆13Updated last month
- Collections of my POCs for android vendor CVEs☆267Updated last year
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆60Updated 2 years ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- ☆116Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆240Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆203Updated last year
- Generic Frida Script To Bypass Root Detection☆55Updated 2 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- you can use frida in jeb !☆46Updated 2 years ago
- Android kernel exploitation for CVE-2022-20409☆177Updated 5 months ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆119Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 7 months ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆162Updated 9 months ago
- Android Root Zap Framework, Lazy and Powerful :)☆51Updated 2 years ago
- jni.h compiled for Ghidra☆78Updated 5 years ago
- ☆89Updated 3 years ago
- ART tracing research☆88Updated 2 years ago
- Plugins for reversing android apps in JEB☆67Updated 5 months ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 3 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆141Updated last year
- Android library for detecting Android virtual containers.☆68Updated 4 years ago