ng-dst / flashable-android-rootkitLinks
Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from anything except root
☆68Updated last year
Alternatives and similar repositories for flashable-android-rootkit
Users that are interested in flashable-android-rootkit are comparing it to the libraries listed below
Sorting:
- Installs a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissio…☆68Updated 4 years ago
- ☆15Updated 2 months ago
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆74Updated last year
- Fuzzer for fastboot commands☆22Updated last year
- apksigtool - parse/verify/clean/sign android apk (signing block)☆47Updated 9 months ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- Documenting the boot process of the Rabbit R1 (MediaTek mt6765, k65v1_64_bsp, Android 13)☆52Updated 7 months ago
- Proof-of-Concept for SVE-2016-7930 : multiple buffer overflows in Samsung Galaxy bootloader☆20Updated 7 years ago
- ☆51Updated last year
- MediaTek BP firmware tools☆60Updated last year
- SIFA-based attacks on AES☆38Updated 7 months ago
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆70Updated 10 months ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆57Updated 2 months ago
- Frida gadget for dumping traffic between an apk and usb device☆24Updated 2 years ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆48Updated 3 years ago
- SUC - A tool to dump RAM using Samsung S-Boot Upload Mode☆80Updated 2 months ago
- ☆80Updated last year
- Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by …☆80Updated last year
- Supporting code and apps for demonstrating Android interprocess communication☆41Updated 11 months ago
- PoC for PixieFail vulnerabilities☆23Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆15Updated 2 months ago
- OpenOCD with Qualcomm patches (rebased)☆19Updated 3 months ago
- Unsigned code loader for Amlogic BootROM☆81Updated 2 years ago
- Simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge☆14Updated 6 years ago
- ☆18Updated 3 years ago
- ☆21Updated 6 years ago
- A tool that bypasses PN553 signature protection☆50Updated last year
- A proof-of-concept for CVE-2020-12753☆43Updated 5 years ago
- ☆22Updated 3 months ago