Security/B2G/RootingTools
Objective
The purpose of this document is to collect Android rooting tools, and to evaluate their potential for aiding us in FxOS platform security testing.
Criteria list
Each tool is evaluated by a set of criteria chosen to provide a quick overview of the tool's capabilities and opportunities for integration into existing environments.
Homepage | |
Code | |
Target user group | |
Programming language | |
License | |
Operating system | |
Current version | |
Interface |
Links to check out
Projects
Android Rooting Tools
Summary
Collection of local Android root exploits and tools to engineer, port, and maintain them. Exploit parameters (memory locations etc.) are collected in a per-device database.
Criteria
Homepage | https://github.com/android-rooting-tools |
Code | https://github.com/android-rooting-tools |
Target user group | rooters, pentesters |
Programming language | C, sql, ARM ELF binaries |
License | partly none, partly GPL3 |
Operating system | prevalently Android NDK, some host-side maintenance code in C |
Current version | (git: 2014-01-27) |
Interface | Shell |
Features
The Android Rooting Tools project is actively maintained. Work on the github repository is seeing ongoing and frequent contributions by several github users, so chances are high that the project will not be abandoned soon.
Its device database currently lists 186 devices, but at this point it's unclear whether this means that there's a working exploit for all of them.
The list of attempted exploits is:
- acdb
- fj_hdcp
- msm_cameraconfig
- put_user
- fb_mem
- perf_swevent
- diag_exploit