ng-dst / flashable-android-rootkit
Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from anything except root
☆58Updated 11 months ago
Alternatives and similar repositories for flashable-android-rootkit:
Users that are interested in flashable-android-rootkit are comparing it to the libraries listed below
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆68Updated 7 months ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆24Updated 2 years ago
- Fuzzer for fastboot commands☆22Updated last year
- Dalvik bytecode disassembler and graph view☆68Updated 10 months ago
- Installs a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissio…☆58Updated 3 years ago
- Frida plugin for Binary Ninja☆17Updated 3 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆72Updated last year
- Rust ADB client - Mirror of https://github.com/cocool97/adb_client☆21Updated last month
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆49Updated 3 years ago
- apksigtool - parse/verify/clean/sign android apk (signing block)☆45Updated 6 months ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆38Updated 2 years ago
- A tool that bypasses PN553 signature protection☆49Updated last year
- MediaTek BP firmware tools☆55Updated 10 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆88Updated last year
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆72Updated last year
- Reverse engineering the TI AM3358 boot ROM☆52Updated 8 months ago
- DxFx is a proof-of-concept DJI Pilot unpacker☆38Updated last year
- exploits for CVE-2024-20017☆137Updated 7 months ago
- Framework for abuse Apple Find My Network to perform unprivileged device tracking. Will present in USENIX Security '25.☆37Updated 2 weeks ago
- Instant, in-browser decoding of ProtoBuf, bplist, ASN.1, NSArchive, and OPACK payloads☆21Updated last week
- Frida gadget for dumping traffic between an apk and usb device☆23Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆96Updated 4 years ago
- Type diagram plugin for JADX decompiler☆59Updated 2 months ago
- Universal BLE Monitoring with Frida (or Objection)☆98Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- Documenting the boot process of the Rabbit R1 (MediaTek mt6765, k65v1_64_bsp, Android 13)☆47Updated 4 months ago
- This is a RCE bluetooth vulnerability on Android 8.0 and 9.0☆22Updated last year
- ☆15Updated 3 years ago
- ☆22Updated 7 years ago