polygraphene / DirtyPipe-AndroidLinks
Dirty Pipe root exploit for Android (Pixel 6)
☆844Updated 3 years ago
Alternatives and similar repositories for DirtyPipe-Android
Users that are interested in DirtyPipe-Android are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆338Updated 2 years ago
- A PoC application demonstrating the power of an Android kernel arbitrary R/W.☆435Updated 5 years ago
- A third-party Xposed framework implementation which supports Android 5.0~14.☆904Updated last year
- ☆268Updated last year
- Using DirtyPipe to gain temporary root access for Android devices.☆304Updated 3 years ago
- Oppo .ofp Firmware decrypter and oneplus .ops de-/encrypter☆642Updated last year
- ☆760Updated 3 years ago
- Parsing and re-packing Android boot.img/vbmeta.img/payload.bin, supporting Android 15☆1,260Updated last week
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆126Updated 6 years ago
- Get bootless root access with few clicks.☆1,121Updated 10 months ago
- Bypass APK Signatures Verify & Integrity Check using Reflection☆419Updated last year
- ☆215Updated 3 years ago
- Collections of my POCs for android vendor CVEs☆285Updated 2 years ago
- Collection of Some Publically Available POC Apps to Detect Root/Magisk presence.☆801Updated 2 months ago
- Oppo Firmware .ozip decrypter☆420Updated 3 years ago
- Install Magisk on Official Android Emulator☆756Updated 2 years ago
- Patching and hooking the Linux kernel with only a stripped Linux kernel image.☆1,209Updated this week
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆278Updated 2 years ago
- Detect Zygote native injection like Riru and Zygisk☆296Updated 3 years ago
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arb…☆204Updated last year
- A hook framework for Android Runtime (ART)☆1,198Updated 2 months ago
- ☆353Updated 4 years ago
- https://5ec1cff.github.io/my-blog☆338Updated 2 years ago
- Extract given archive to images☆345Updated 11 months ago
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆889Updated 3 months ago
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,319Updated 2 weeks ago
- Patch boot image with magisk on windows/linux/macos☆260Updated 10 months ago
- ☆152Updated 2 years ago
- A collection of (mostly) static cross compiled binaries for android☆514Updated last year
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆214Updated 2 years ago