polygraphene / DirtyPipe-Android
Dirty Pipe root exploit for Android (Pixel 6)
☆787Updated 2 years ago
Alternatives and similar repositories for DirtyPipe-Android:
Users that are interested in DirtyPipe-Android are comparing it to the libraries listed below
- Using DirtyPipe to gain temporary root access for Android devices.☆260Updated 2 years ago
- A third-party Xposed framework implementation which supports Android 5.0~14.☆789Updated 10 months ago
- A hook framework for Android Runtime (ART)☆931Updated 2 weeks ago
- A collection of (mostly) static cross compiled binaries for android☆472Updated 9 months ago
- A PoC application demonstrating the power of an Android kernel arbitrary R/W.☆414Updated 4 years ago
- Get bootless root access with few clicks.☆977Updated 9 months ago
- ☆887Updated last week
- Patching and hooking the Linux kernel with only a stripped Linux kernel image.☆790Updated 2 weeks ago
- ☆660Updated 2 years ago
- An easy-to-use, high-performance dex deobfuscation library.☆510Updated last month
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆999Updated this week
- Parsing and re-packing Android boot.img/vbmeta.img/payload.bin, supporting Android 15☆1,086Updated last month
- Automated scripts to unpack/repack Android kernel/recovery images + ramdisks☆903Updated last year
- Magisk Module that allows you to run "adb root". Android 10 only. Probably will work with Android 9. Definitely not with Android 11/12.☆457Updated 8 months ago
- A Riru module trying to make Magisk more hidden.☆695Updated 2 years ago
- movecert☆690Updated last year
- Detect Zygote native injection like Riru and Zygisk☆251Updated 2 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆283Updated last year
- Make system partition become read-write (it is also possible without Magisk)☆812Updated 9 months ago
- ☆198Updated 2 years ago
- 无限期停更,请移步 https://5ec1cff.github.io/my-blog☆291Updated last year
- Modify framework.jar to build on system level a valid certificate chain☆324Updated 5 months ago
- Android kernel exploitation for CVE-2022-20409☆170Updated 3 months ago
- Oppo .ofp Firmware decrypter and oneplus .ops de-/encrypter☆564Updated 2 weeks ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆238Updated last year
- Oppo Firmware .ozip decrypter☆390Updated 2 years ago
- A library to detect suspicious apps like Magisk☆759Updated last year
- Collection of Some Publically Available POC Apps to Detect Root/Magisk presence.☆380Updated last month
- Patch boot image with magisk on windows/linux/macos☆228Updated 10 months ago
- ☆187Updated 4 months ago