ng-dst / flashable-android-rootkitLinks
Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from anything except root
☆73Updated last year
Alternatives and similar repositories for flashable-android-rootkit
Users that are interested in flashable-android-rootkit are comparing it to the libraries listed below
Sorting:
- Installs a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissio…☆72Updated 4 years ago
- Fuzzer for fastboot commands☆23Updated 2 years ago
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆79Updated last year
- apksigtool - parse/verify/clean/sign android apk (signing block)☆49Updated last year
- MediaTek BP firmware tools☆67Updated last week
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆82Updated last year
- legacy MTK devices preLoader from Mediatek☆20Updated last year
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by …☆83Updated last year
- Another bootrom exploit for MediaTek devices☆223Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated last year
- ☆81Updated last year
- ☆50Updated last year
- Type diagram plugin for JADX decompiler☆74Updated last month
- Dalvik bytecode disassembler and graph view☆65Updated last year
- Proof-of-Concept for SVE-2016-7930 : multiple buffer overflows in Samsung Galaxy bootloader☆20Updated 8 years ago
- exploits for CVE-2024-20017☆140Updated last year
- SIFA-based attacks on AES☆38Updated last year
- Library and command line tool for interacting with the MediaTek bootloader, for dumping and flashing firmware☆79Updated 5 years ago
- nanoMIPS module for Ghidra☆54Updated 2 months ago
- SUC - A tool to dump RAM using Samsung S-Boot Upload Mode☆86Updated 8 months ago
- Documenting the boot process of the Rabbit R1 (MediaTek mt6765, k65v1_64_bsp, Android 13)☆57Updated last year
- ☆22Updated 6 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆274Updated 2 years ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆190Updated last year
- Patched GDB-Multiarch to debug android Kernels.☆13Updated 6 years ago
- Extractor: The Android firmware image extraction tool☆120Updated last month
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year