quarkslab / AERoot
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆202Updated last year
Alternatives and similar repositories for AERoot:
Users that are interested in AERoot are comparing it to the libraries listed below
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆339Updated last year
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆128Updated 4 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆288Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆141Updated last year
- ☆170Updated 4 years ago
- Defeat Java packers via Frida instrumentation☆198Updated 2 years ago
- ☆88Updated 3 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆114Updated 3 years ago
- My own collection of Frida scripts and tricks☆67Updated 3 years ago
- Android kernel exploitation for CVE-2022-20409☆175Updated 4 months ago
- Frida Android utilities☆253Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆238Updated last year
- PoC Frida script to view Android libbinder traffic☆135Updated 7 months ago
- This script automates the task of patching an apk with frida-gadget☆148Updated 2 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆165Updated last year
- Files used to resolve the r2pay challenge☆50Updated 4 years ago
- This repo aims at providing practical examples on how to use r2frida☆199Updated 4 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆86Updated 10 months ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆226Updated 4 years ago
- Android Dex disassembler and Binary Ninja plugin☆60Updated 10 months ago
- Deobfuscator for Android Application☆426Updated 2 years ago
- Some Of Anti-Frida Stuff☆117Updated 2 years ago
- Python API Monitor for Android apps☆55Updated 8 months ago
- Exploits for Android Binder bug CVE-2020-0041☆230Updated 4 years ago
- Plugins for reversing android apps in JEB☆67Updated 5 months ago
- Example showing how to use Frida for standalone injection of a custom payload☆160Updated 4 years ago
- Automated Frida hook generation with JEB☆141Updated last year
- A place to reborn☆59Updated 2 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- Collections of my POCs for android vendor CVEs☆268Updated last year