tiann / DirtyPipe-Android
Dirty Pipe root exploit for Android (Pixel 6)
☆18Updated 2 years ago
Alternatives and similar repositories for DirtyPipe-Android:
Users that are interested in DirtyPipe-Android are comparing it to the libraries listed below
- ☆40Updated 2 years ago
- ☆55Updated 8 months ago
- Magisk module to enable adb root☆42Updated 7 months ago
- Let's control Secure Boot Chain ourselves.☆51Updated this week
- Legacy Systemless Xposed Framework by topjohnwu☆32Updated 2 years ago
- ☆47Updated 2 months ago
- ☆12Updated 11 months ago
- ☆28Updated 4 months ago
- ☆27Updated 4 years ago
- OverlayFS style based on Magic mount☆40Updated last year
- MagiskHide in Zygisk☆79Updated 2 years ago
- Compile shell script as binary☆19Updated 2 months ago
- Make system partition become read-write. Kernel must support overlayfs!☆81Updated last year
- Example module☆68Updated last year
- Direct SurfaceFlinger access as root☆33Updated 11 months ago
- ☆61Updated this week
- ☆26Updated 3 months ago
- KernelSU modified for debugging☆33Updated last year
- Inject into zygote process☆30Updated 2 years ago
- Dump Android's payload.bin☆40Updated last year
- move to: https://github.com/sekaiacg/erofs-utils☆28Updated 2 years ago
- Inject Android system properties☆17Updated 2 years ago
- Simple PLT hook for Android☆90Updated 8 months ago
- Get MagiskHide to work again on Magisk v23☆17Updated 2 years ago
- support linux & windows☆12Updated 5 years ago
- A library for building Java only Zygisk/Riru modules.☆59Updated last year
- A xposed module to bypass protectt.ai in Kotak Neo☆47Updated 3 months ago
- A kernel module for protecting android rooted device☆32Updated last year
- Tool for unpacking and packaging splash image for Qualcomm & OPlus Qualcomm devices☆44Updated 10 months ago
- 利用Magisk/KernelSU在开机后加载内核模块☆17Updated last year