polygraphene / DirtyPipe-AndroidLinks
Dirty Pipe root exploit for Android (Pixel 6)
☆826Updated 3 years ago
Alternatives and similar repositories for DirtyPipe-Android
Users that are interested in DirtyPipe-Android are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆327Updated 2 years ago
- Using DirtyPipe to gain temporary root access for Android devices.☆286Updated 2 years ago
- A PoC application demonstrating the power of an Android kernel arbitrary R/W.☆426Updated 5 years ago
- ☆247Updated last year
- A third-party Xposed framework implementation which supports Android 5.0~14.☆890Updated last year
- ☆735Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆265Updated 2 years ago
- Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215☆122Updated 5 years ago
- Oppo .ofp Firmware decrypter and oneplus .ops de-/encrypter☆612Updated 8 months ago
- Collection of Some Publically Available POC Apps to Detect Root/Magisk presence.☆666Updated last month
- A hook framework for Android Runtime (ART)☆1,131Updated 2 months ago
- Oppo Firmware .ozip decrypter☆412Updated 2 years ago
- Get bootless root access with few clicks.☆1,071Updated 6 months ago
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arb…☆201Updated 11 months ago
- Patching and hooking the Linux kernel with only a stripped Linux kernel image.☆1,045Updated 3 weeks ago
- ☆210Updated 3 years ago
- Detect Zygote native injection like Riru and Zygisk☆286Updated 3 years ago
- Parsing and re-packing Android boot.img/vbmeta.img/payload.bin, supporting Android 15☆1,216Updated 3 weeks ago
- Install Magisk on Official Android Emulator☆743Updated last year
- ☆333Updated 4 years ago
- Bypass APK Signatures Verify & Integrity Check using Reflection☆399Updated last year
- Extract given archive to images☆336Updated 6 months ago
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆1,211Updated 2 weeks ago
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆754Updated 2 months ago
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆310Updated 10 months ago
- Android kernel exploitation for CVE-2022-20409☆195Updated 11 months ago
- Collections of my POCs for android vendor CVEs☆273Updated 2 years ago
- https://5ec1cff.github.io/my-blog☆325Updated last year
- PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from…☆160Updated last year
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆712Updated 3 weeks ago