secmob / TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-DevicesLinks
☆173Updated 4 years ago
Alternatives and similar repositories for TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices
Users that are interested in TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices are comparing it to the libraries listed below
Sorting:
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆228Updated 4 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆122Updated 3 years ago
- ☆102Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆236Updated 5 years ago
- Frida-based general purpose fuzzer☆216Updated 4 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆132Updated 4 years ago
- Research related☆87Updated 3 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- ☆56Updated 4 months ago
- Collections of my POCs for android vendor CVEs☆269Updated last year
- ☆31Updated 2 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆279Updated 3 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆194Updated 2 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆574Updated 4 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆206Updated last year
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆123Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆117Updated 3 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆138Updated 9 years ago
- ☆118Updated 2 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆348Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆151Updated 5 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 10 months ago
- This repo aims at providing practical examples on how to use r2frida☆201Updated 4 years ago
- ☆75Updated 5 years ago
- ☆90Updated 2 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆67Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆106Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆65Updated 2 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago