quarkslab / AERoot
AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
☆205Updated last year
Alternatives and similar repositories for AERoot
Users that are interested in AERoot are comparing it to the libraries listed below
Sorting:
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆346Updated last year
- ☆90Updated 3 years ago
- Defeat Java packers via Frida instrumentation☆200Updated 2 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆131Updated 4 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆115Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 9 months ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆301Updated 2 years ago
- My own collection of Frida scripts and tricks☆69Updated 3 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆88Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆245Updated last year
- This script automates the task of patching an apk with frida-gadget☆151Updated last month
- Collections of my POCs for android vendor CVEs☆269Updated last year
- Files used to resolve the r2pay challenge☆51Updated 4 years ago
- Miscellaneous code☆106Updated last month
- ☆173Updated 4 years ago
- Dynamic injection tool for Linux/Android☆117Updated 4 months ago
- Automated Frida hook generation with JEB☆146Updated last year
- Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.☆167Updated 2 years ago
- Android kernel exploitation for CVE-2022-20409☆180Updated 6 months ago
- Frida Android utilities☆256Updated last year
- This repo aims at providing practical examples on how to use r2frida☆199Updated 4 years ago
- Property extractor for Android apps☆289Updated last month
- ☆118Updated 2 years ago
- Exploits for Android Binder bug CVE-2020-0041☆235Updated 5 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆54Updated 4 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆161Updated 4 years ago
- Frida hook generator for Ghidra☆118Updated 4 months ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆137Updated 9 years ago
- A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices☆186Updated last year