polygraphene / DirtyPipe-Android
Dirty Pipe root exploit for Android (Pixel 6)
☆806Updated 2 years ago
Alternatives and similar repositories for DirtyPipe-Android:
Users that are interested in DirtyPipe-Android are comparing it to the libraries listed below
- Using DirtyPipe to gain temporary root access for Android devices.☆271Updated 2 years ago
- A hook framework for Android Runtime (ART)☆1,011Updated last month
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆301Updated 2 years ago
- A third-party Xposed framework implementation which supports Android 5.0~14.☆839Updated last year
- An easy-to-use, high-performance dex deobfuscation library.☆595Updated 2 weeks ago
- A PoC application demonstrating the power of an Android kernel arbitrary R/W.☆418Updated 5 years ago
- ☆201Updated 3 years ago
- ☆697Updated 2 years ago
- A collection of (mostly) static cross compiled binaries for android☆485Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆245Updated last year
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆628Updated last year
- A Riru module trying to make Magisk more hidden.☆708Updated 2 years ago
- Parsing and re-packing Android boot.img/vbmeta.img/payload.bin, supporting Android 15☆1,130Updated 3 months ago
- Patching and hooking the Linux kernel with only a stripped Linux kernel image.☆870Updated 2 months ago
- Detect Zygote native injection like Riru and Zygisk☆272Updated 3 years ago
- ☆1,113Updated 3 months ago
- https://5ec1cff.github.io/my-blog☆310Updated last year
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arb…☆193Updated 6 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆496Updated last year
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,095Updated 2 weeks ago
- A lightweight Android container on Android☆1,733Updated 2 years ago
- Patch boot image with magisk on windows/linux/macos☆230Updated last month
- Android kernel exploitation for CVE-2022-20409☆180Updated 6 months ago
- A library to detect suspicious apps like Magisk☆870Updated last year
- Oppo Firmware .ozip decrypter☆398Updated 2 years ago
- Oppo .ofp Firmware decrypter and oneplus .ops de-/encrypter☆589Updated 3 months ago
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆117Updated 5 years ago
- movecert☆706Updated last year
- Collection of Some Publically Available POC Apps to Detect Root/Magisk presence.☆530Updated last month
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆656Updated 9 months ago