scs-labrat / android_autorooterLinks
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely
☆73Updated last year
Alternatives and similar repositories for android_autorooter
Users that are interested in android_autorooter are comparing it to the libraries listed below
Sorting:
- This repository contains a few leaked files of HookBot.☆107Updated 2 years ago
- Telegram video (mp4) extension manipulation PoC☆96Updated 7 months ago
- hiding in plain sight: part 2☆45Updated last year
- Scripts to set up your own Android 📱 app hacking lab☆91Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated 3 months ago
- ☆139Updated last week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆88Updated last month
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Updated last year
- APK Infrastructure Investigator☆65Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆186Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆57Updated 8 months ago
- Fetching passwords from the chrome browser database☆92Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆37Updated 6 months ago
- Windows And Ways To Break It☆98Updated 2 years ago
- Kali Packerge Manager☆64Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Web Path Finder☆61Updated last year
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆34Updated last year
- GitHub CVE Repository Hunt☆19Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆39Updated 6 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆119Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆71Updated last year