AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆212Nov 1, 2023Updated 2 years ago
Alternatives and similar repositories for AERoot
Users that are interested in AERoot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Jul 21, 2023Updated 2 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆139Jan 28, 2021Updated 5 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,125Feb 2, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Symbolic executor for Binary Ninja's MLIL☆25Oct 3, 2024Updated last year
- Mobile Edge-Dynamic Unified Security Analysis☆2,247Apr 28, 2026Updated last week
- A small utilitiy to scan process memory and search patterns using frida with a single line of command☆22Aug 4, 2021Updated 4 years ago
- ☆97Mar 2, 2022Updated 4 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,835Jul 18, 2023Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆219Dec 4, 2025Updated 5 months ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆62Apr 23, 2026Updated last week
- Python API Monitor for Android apps☆88Jul 4, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- KernelSU modified for debugging☆35Aug 9, 2023Updated 2 years ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆3,004Mar 28, 2026Updated last month
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆344Apr 12, 2023Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆291Jul 24, 2025Updated 9 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆286May 27, 2023Updated 2 years ago
- Frida module to hook module initializations on android☆68Jan 4, 2021Updated 5 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Nov 18, 2019Updated 6 years ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 3 years ago
- Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.☆145Mar 31, 2024Updated 2 years ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆745Sep 11, 2025Updated 7 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆108Jan 31, 2024Updated 2 years ago
- A portable utility to locate android binder service☆100Sep 28, 2019Updated 6 years ago
- PoC Frida script to view Android libbinder traffic☆141Jul 27, 2024Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆587Nov 5, 2025Updated 6 months ago
- A frida based hooking framework for android devices used mainly for app research☆14Mar 25, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Android Kernel Exploitation☆646Feb 13, 2022Updated 4 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆414Mar 31, 2026Updated last month
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,462Jun 3, 2021Updated 4 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆180Apr 4, 2023Updated 3 years ago
- Script to quickly hook natives call to JNI in Android☆633Aug 3, 2023Updated 2 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,481Apr 10, 2026Updated 3 weeks ago