quarkslab / AERoot
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆197Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AERoot
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆329Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆109Updated 2 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆140Updated 11 months ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆123Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆232Updated last year
- ☆87Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆196Updated 2 years ago
- My own collection of Frida scripts and tricks☆66Updated 3 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆156Updated 4 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆278Updated last year
- PoC Frida script to view Android libbinder traffic☆132Updated 3 months ago
- Android kernel exploitation for CVE-2022-20409☆160Updated last month
- This script automates the task of patching an apk with frida-gadget☆142Updated 2 years ago
- Some Of Anti-Frida Stuff☆108Updated 2 years ago
- ☆166Updated 4 years ago
- Plugins for reversing android apps in JEB☆65Updated last month
- A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.☆61Updated 7 months ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆204Updated 10 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆54Updated 3 years ago
- Property extractor for Android apps☆267Updated 3 weeks ago
- This repo aims at providing practical examples on how to use r2frida☆198Updated 3 years ago
- ☆107Updated last year
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆133Updated 8 years ago
- Collections of my POCs for android vendor CVEs☆257Updated last year
- Deobfuscator for Android Application☆406Updated 2 years ago
- A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices☆176Updated 8 months ago
- Android Dex disassembler and Binary Ninja plugin☆54Updated 6 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆84Updated 7 months ago
- PoC to bypass Android restrictions☆196Updated 5 years ago