scs-labrat / android_autorooterLinks
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely
☆73Updated last year
Alternatives and similar repositories for android_autorooter
Users that are interested in android_autorooter are comparing it to the libraries listed below
Sorting:
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 8 months ago
- Scripts to set up your own Android 📱 app hacking lab☆91Updated last year
- hiding in plain sight: part 2☆45Updated last year
- Telegram video (mp4) extension manipulation PoC☆95Updated 7 months ago
- Kali Packerge Manager☆65Updated last year
- This repository contains a few leaked files of HookBot.☆105Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- APK Infrastructure Investigator☆65Updated 2 years ago
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 5 months ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆17Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆11Updated 2 years ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated 3 months ago
- ☆135Updated 3 weeks ago
- exploits for CVE-2024-20017☆139Updated last year
- 🔮 Python Remote administration tool via telegram☆54Updated 5 months ago
- Windows And Ways To Break It☆98Updated last year
- Here are +200 different rats some with source code☆123Updated 2 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆34Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆86Updated last month
- Fetching passwords from the chrome browser database☆92Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆185Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Updated last year
- Social Engineering Browser Update Attack.☆55Updated last year
- Web Path Finder☆61Updated last year