quarkslab / AERootLinks
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆207Updated last year
Alternatives and similar repositories for AERoot
Users that are interested in AERoot are comparing it to the libraries listed below
Sorting:
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆135Updated 4 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆150Updated last year
- ☆94Updated 3 years ago
- ☆171Updated 5 years ago
- Defeat Java packers via Frida instrumentation☆206Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆90Updated last year
- My own collection of Frida scripts and tricks☆68Updated 4 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- Python API Monitor for Android apps☆78Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆354Updated 2 years ago
- a useful utility for android app security testing☆91Updated 5 months ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆329Updated 2 years ago
- Miscellaneous code☆109Updated 3 months ago
- ☆30Updated 3 years ago
- PoC to bypass Android restrictions☆213Updated 6 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆53Updated 4 years ago
- Frida Android utilities☆260Updated last year
- PoC Frida script to view Android libbinder traffic☆140Updated last year
- Property extractor for Android apps☆301Updated 7 months ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆173Updated 2 years ago
- This repo aims at providing practical examples on how to use r2frida☆203Updated 4 years ago
- Files used to resolve the r2pay challenge☆53Updated 5 years ago
- Collections of my POCs for android vendor CVEs☆272Updated 2 years ago
- Android Dex disassembler and Binary Ninja plugin☆67Updated 3 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆265Updated 2 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆163Updated 5 years ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆102Updated 3 years ago
- jni.h compiled for Ghidra☆88Updated 5 years ago