AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆212Nov 1, 2023Updated 2 years ago
Alternatives and similar repositories for AERoot
Users that are interested in AERoot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Jul 21, 2023Updated 2 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆139Jan 28, 2021Updated 5 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,124Feb 2, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Symbolic executor for Binary Ninja's MLIL☆25Oct 3, 2024Updated last year
- Mobile Edge-Dynamic Unified Security Analysis☆2,218Updated this week
- A small utilitiy to scan process memory and search patterns using frida with a single line of command☆22Aug 4, 2021Updated 4 years ago
- ☆97Mar 2, 2022Updated 4 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,826Jul 18, 2023Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆219Dec 4, 2025Updated 4 months ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆62Apr 2, 2026Updated last week
- Python API Monitor for Android apps☆88Jul 4, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- KernelSU modified for debugging☆35Aug 9, 2023Updated 2 years ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,996Mar 28, 2026Updated 2 weeks ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆341Apr 12, 2023Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆292Jul 24, 2025Updated 8 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆285May 27, 2023Updated 2 years ago
- rewrite dex file☆42Dec 15, 2021Updated 4 years ago
- Frida module to hook module initializations on android☆68Jan 4, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Nov 18, 2019Updated 6 years ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆108Jan 31, 2024Updated 2 years ago
- Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.☆144Mar 31, 2024Updated 2 years ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆745Sep 11, 2025Updated 7 months ago
- A portable utility to locate android binder service☆98Sep 28, 2019Updated 6 years ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆583Nov 5, 2025Updated 5 months ago
- PoC Frida script to view Android libbinder traffic☆141Jul 27, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A frida based hooking framework for android devices used mainly for app research☆14Mar 25, 2018Updated 8 years ago
- Android Kernel Exploitation☆643Feb 13, 2022Updated 4 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,461Jun 3, 2021Updated 4 years ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆412Mar 31, 2026Updated 2 weeks ago
- Script to quickly hook natives call to JNI in Android☆630Aug 3, 2023Updated 2 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆179Apr 4, 2023Updated 3 years ago