quarkslab / AERootLinks
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆208Updated last year
Alternatives and similar repositories for AERoot
Users that are interested in AERoot are comparing it to the libraries listed below
Sorting:
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆145Updated last year
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆135Updated 4 years ago
- ☆92Updated 3 years ago
- Defeat Java packers via Frida instrumentation☆206Updated 2 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆90Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Updated 2 years ago
- a useful utility for android app security testing☆91Updated 4 months ago
- ☆30Updated 3 years ago
- Frida Android utilities☆260Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Updated 3 years ago
- Python API Monitor for Android apps☆79Updated last year
- This script automates the task of patching an apk with frida-gadget☆160Updated 2 months ago
- Property extractor for Android apps☆301Updated 6 months ago
- Miscellaneous code☆109Updated 3 months ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆173Updated 2 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- The new bridge between Ghidra and Frida!☆126Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆327Updated 2 years ago
- ☆172Updated 5 years ago
- This repo aims at providing practical examples on how to use r2frida☆206Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆140Updated last year
- PoC to bypass Android restrictions☆212Updated 6 years ago
- A place to reborn☆60Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- A basic android pentest environment to instrument apps without root or repackaging an app☆65Updated 4 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- Android Dex disassembler and Binary Ninja plugin☆66Updated 2 months ago
- Files used to resolve the r2pay challenge☆53Updated 5 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆53Updated 4 years ago