quarkslab / AERootLinks
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆208Updated last year
Alternatives and similar repositories for AERoot
Users that are interested in AERoot are comparing it to the libraries listed below
Sorting:
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆134Updated 4 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- Defeat Java packers via Frida instrumentation☆205Updated 2 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Updated 3 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- ☆90Updated 3 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆88Updated last year
- Python API Monitor for Android apps☆76Updated last year
- a useful utility for android app security testing☆90Updated last month
- Frida Android utilities☆257Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆315Updated 2 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆352Updated last year
- Miscellaneous code☆109Updated last week
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆170Updated 2 years ago
- This repo aims at providing practical examples on how to use r2frida☆203Updated 4 years ago
- PoC to bypass Android restrictions☆210Updated 6 years ago
- PoC Frida script to view Android libbinder traffic☆138Updated 11 months ago
- Property extractor for Android apps