tiann / DirtyPipe-AndroidLinks
Dirty Pipe root exploit for Android (Pixel 6)
☆22Updated 2 years ago
Alternatives and similar repositories for DirtyPipe-Android
Users that are interested in DirtyPipe-Android are comparing it to the libraries listed below
Sorting:
- Magisk module to enable adb root☆51Updated last year
- Let's control Secure Boot Chain ourselves.☆83Updated 2 months ago
- ☆24Updated last year
- ☆42Updated last year
- ☆64Updated this week
- Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by …☆82Updated last year
- Mirror of Kernel-Assisted Superuser☆28Updated 4 years ago
- ☆43Updated 2 years ago
- ☆24Updated 2 years ago
- Builds a TWRP compatible zip that installs EdXposed framework straight to system partition without installing root tools☆40Updated 4 years ago
- support linux & windows☆12Updated 6 years ago
- PoC of unlocking an Android device without lock screen password☆59Updated 2 years ago
- Example module☆79Updated 2 years ago
- 利用Magisk/KernelSU在开机后加载内核模块☆31Updated 2 years ago
- This repository contains magiskboot and mkbootimg based android image kitchen.☆68Updated 4 months ago
- A bash script that utilizes avbtool & magiskboot to patch recovery images of dynamic samsung devices with android 10 and above to enable …☆43Updated last year
- Tool for unpacking and packaging splash image for Qualcomm & OPlus Qualcomm devices☆51Updated last year
- Magisk Boot Image Patcher☆31Updated 9 months ago
- Magisk Module to enable engineering build props☆27Updated 5 years ago
- MagiskHide in Zygisk☆86Updated 3 years ago
- ☆69Updated 2 months ago
- Disables FBE, proca, Vaultkeeper and auto-reflash of stock recovery on Samsung Pie devices, TESTED on S10, N10, A10 - A50 and Tab A 10.1 …☆11Updated 3 years ago
- convert your read-only super partition (including all sub-partitions) from read-only to read/write-able (compatible with EXT4, EROFS and …☆45Updated 2 years ago
- Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arb…☆201Updated last year
- A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models☆76Updated last week
- A library for building Java only Zygisk/Riru modules.☆65Updated 2 years ago
- KernelSU modified for debugging☆33Updated 2 years ago
- Intent traffic monitoring tool.☆65Updated 4 years ago
- Magisk/KernelSU module for running Tailscale on rooted Android devices. The easiest, most secure way to use WireGuard and 2FA.☆15Updated last year
- ☆18Updated 3 years ago