AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆212Nov 1, 2023Updated 2 years ago
Alternatives and similar repositories for AERoot
Users that are interested in AERoot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Jul 21, 2023Updated 2 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆139Jan 28, 2021Updated 5 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,123Feb 2, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Symbolic executor for Binary Ninja's MLIL☆25Oct 3, 2024Updated last year
- Mobile Edge-Dynamic Unified Security Analysis☆2,198Mar 19, 2026Updated last week
- A small utilities to scan process memory and search patterns using frida with a single line of command☆22Aug 4, 2021Updated 4 years ago
- ☆96Mar 2, 2022Updated 4 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,822Jul 18, 2023Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆216Dec 4, 2025Updated 3 months ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆62Mar 13, 2026Updated last week
- Python API Monitor for Android apps☆87Jul 4, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- KernelSU modified for debugging☆34Aug 9, 2023Updated 2 years ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,989Mar 18, 2026Updated last week
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆343Apr 12, 2023Updated 2 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆291Jul 24, 2025Updated 8 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆284May 27, 2023Updated 2 years ago
- rewrite dex file☆42Dec 15, 2021Updated 4 years ago
- Frida module to hook module initializations on android☆68Jan 4, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Nov 18, 2019Updated 6 years ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆105Jan 31, 2024Updated 2 years ago
- Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.☆144Mar 31, 2024Updated last year
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆744Sep 11, 2025Updated 6 months ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆582Nov 5, 2025Updated 4 months ago
- PoC Frida script to view Android libbinder traffic☆141Jul 27, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A frida based hooking framework for android devices used mainly for app research☆14Mar 25, 2018Updated 8 years ago
- Android Kernel Exploitation☆642Feb 13, 2022Updated 4 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,461Jun 3, 2021Updated 4 years ago
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆409Aug 23, 2023Updated 2 years ago
- Script to quickly hook natives call to JNI in Android☆627Aug 3, 2023Updated 2 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆178Apr 4, 2023Updated 2 years ago