TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices

Android Exploit Chain

An exploit chain designed to remotely root modern Android devices using three identified vulnerabilities.

GitHub

166 stars
12 watching
27 forks
last commit: over 4 years ago

Related projects:

Repository Description Stars
sh4hin/androl4b A virtual machine for assessing and analyzing Android applications' security and vulnerabilities 1,104
arimogi/google-dorks A collection of tools and techniques for exploiting vulnerabilities in Google services 45
timwr/cve-2016-5195 A proof of concept exploit demonstrating a vulnerability in Android's SELinux implementation 956
sgayou/subaru-starlink-research Researchers aim to develop a jailbreak tool for Subaru StarLink head units, exploiting a known vulnerability to execute arbitrary code on the device. 554
b3nac/android-reports-and-resources A collection of Android-related security vulnerabilities and resources 1,491
sundaysec/android-exploits A collection of exploits and guides on Android security testing 797
siguza/v0rtex An exploit tool for iOS Surface vulnerabilities 218
t0thkr1s/allsafe An intentionally vulnerable Android application with various exploitable security vulnerabilities. 213
a-yatta/amdh Automates scanning and hardening of Android devices to detect malware and protect user privacy. 200
realitynet/android-forensics-references A collection of references and resources for analyzing Android devices and applications. 287
rsmudge/zerologon-bof An implementation of a Zero Logon protocol Bounce Of Flood (ZoBoF) vulnerability exploitation technique 157
danigargu/cve-2020-0796 An exploit tool for a Windows SMBv3 vulnerability 1,304
sslab-gatech/pwn2own2020 An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS 402
rewanthtammana/damn-vulnerable-bank An intentionally vulnerable Android application designed to test security hacking skills 654
rsmudge/cve-2020-0796-bof Exploits a vulnerability in SMBv3 compression to achieve privilege escalation and process manipulation. 68