VIKIROOT icon indicating copy to clipboard operation
VIKIROOT copied to clipboard

CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow

Results 5 VIKIROOT issues
Sort by recently updated
recently updated
newest added

step 1 : i use wireless adb connect device `adb connect 192.168.11.128 * daemon not running; starting now at tcp:5037 * daemon started successfully connected to 192.168.11.128:5555` `$ ./exploit 5678...

I try it on Samsung galaxsy s7 with N (7.0). it is looks like nothing is happend.

help wanted

Sir, I am trying to build your code it give me an error like this "aarch64-linux-android-objcopy : payload.o:Invalid bfd target" Is there anything i need to install before start compilation...

如题,是否可以支持4.x和5.x?

enhancement

On LG G4 with Android 6.0, the exploit works (code is running under init process), but fails to connect the shell due to selinux (connect() returns -EACCES). I've been toying...

enhancement
help wanted