quarkslab / AERoot
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆203Updated last year
Alternatives and similar repositories for AERoot:
Users that are interested in AERoot are comparing it to the libraries listed below
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆340Updated last year
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆128Updated 4 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆141Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆115Updated 3 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆291Updated last year
- ☆89Updated 3 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆86Updated 11 months ago
- Defeat Java packers via Frida instrumentation☆199Updated 2 years ago
- ☆170Updated 4 years ago
- Analysis scripts for Ghidra to work with Android NDK libraries.☆334Updated 2 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆240Updated last year
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆166Updated last year
- Example showing how to use Frida for standalone injection of a custom payload☆160Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 7 months ago
- Miscellaneous code☆103Updated 2 months ago
- A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices☆180Updated last year
- A place to reborn☆59Updated 2 years ago
- Files used to resolve the r2pay challenge☆50Updated 4 years ago
- This script automates the task of patching an apk with frida-gadget☆149Updated 2 years ago
- My own collection of Frida scripts and tricks☆68Updated 3 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆227Updated 4 years ago
- Frida hook generator for Ghidra☆115Updated 2 months ago
- Property extractor for Android apps☆284Updated 2 weeks ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆209Updated 10 years ago
- PoC to bypass Android restrictions☆205Updated 5 years ago
- Frida Android utilities☆252Updated last year
- ☆116Updated last year
- Deobfuscator for Android Application☆427Updated 2 years ago
- Tamper detection in Android☆88Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆88Updated last year