polygraphene / DirtyPipe-Android
Dirty Pipe root exploit for Android (Pixel 6)
☆801Updated 2 years ago
Alternatives and similar repositories for DirtyPipe-Android:
Users that are interested in DirtyPipe-Android are comparing it to the libraries listed below
- A hook framework for Android Runtime (ART)☆982Updated this week
- Using DirtyPipe to gain temporary root access for Android devices.☆261Updated 2 years ago
- ☆687Updated 2 years ago
- ☆201Updated 2 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆293Updated last year
- Patching and hooking the Linux kernel with only a stripped Linux kernel image.☆846Updated last month
- Detect Zygote native injection like Riru and Zygisk☆264Updated 2 years ago
- Oppo .ofp Firmware decrypter and oneplus .ops de-/encrypter☆581Updated 2 months ago
- Oppo Firmware .ozip decrypter☆396Updated 2 years ago
- An easy-to-use, high-performance dex deobfuscation library.☆566Updated last week
- A PoC application demonstrating the power of an Android kernel arbitrary R/W.☆417Updated 5 years ago
- Install Magisk on Official Android Emulator☆702Updated last year
- A third-party Xposed framework implementation which supports Android 5.0~14.☆834Updated last year
- Parsing and re-packing Android boot.img/vbmeta.img/payload.bin, supporting Android 15☆1,114Updated last month
- ☆1,042Updated 2 months ago
- ☆196Updated 6 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆241Updated last year
- movecert☆701Updated last year
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,054Updated this week
- Android Kernel Exploitation☆607Updated 3 years ago
- Android kernel exploitation for CVE-2022-20409☆178Updated 5 months ago
- https://5ec1cff.github.io/my-blog☆307Updated last year
- 新版MT去签及对抗☆577Updated 2 years ago
- A library to detect suspicious apps like Magisk☆822Updated last year
- Bypass APK Signatures Verify & Integrity Check using Reflection☆352Updated 7 months ago
- Collection of Some Publically Available POC Apps to Detect Root/Magisk presence.☆467Updated 3 months ago
- Automated scripts to unpack/repack Android kernel/recovery images + ramdisks☆933Updated last year
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆598Updated 11 months ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆186Updated 2 years ago
- Exploits for Android Binder bug CVE-2020-0041☆231Updated 4 years ago