quarkslab / AERoot
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆204Updated last year
Alternatives and similar repositories for AERoot:
Users that are interested in AERoot are comparing it to the libraries listed below
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆343Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆296Updated 2 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆143Updated last year
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆130Updated 4 years ago
- Defeat Java packers via Frida instrumentation☆199Updated 2 years ago
- Frida Android utilities☆256Updated last year
- ☆89Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆243Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆115Updated 3 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆87Updated last year
- ☆170Updated 4 years ago
- Deobfuscator for Android Application☆430Updated 2 years ago
- Some Of Anti-Frida Stuff☆121Updated 2 years ago
- My own collection of Frida scripts and tricks☆68Updated 3 years ago
- Python API Monitor for Android apps☆55Updated 9 months ago
- This script automates the task of patching an apk with frida-gadget☆150Updated 3 weeks ago
- Diff between two APK files.☆128Updated 2 years ago
- Frida hook generator for Ghidra☆117Updated 3 months ago
- PoC Frida script to view Android libbinder traffic☆135Updated 8 months ago
- Dynamic injection tool for Linux/Android☆112Updated 3 months ago
- Android kernel exploitation for CVE-2022-20409☆178Updated 6 months ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆211Updated 10 years ago
- Miscellaneous code☆105Updated 2 weeks ago
- PoC to bypass Android restrictions☆207Updated 6 years ago
- Android Dex disassembler and Binary Ninja plugin☆60Updated 11 months ago
- A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices☆182Updated last year
- Rooting Android Studio Emulator with Android Version 9.0 and above☆54Updated 4 years ago
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆167Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆89Updated last year
- The new bridge between Ghidra and Frida!☆121Updated last year