Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely | https://github.com/scs-labrat/android_autorooter | POC Details |
| 2 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 | https://github.com/pl4int3xt/cve_2024_0044 | POC Details |
| 3 | 利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。 | https://github.com/Re13orn/CVE-2024-0044-EXP | POC Details |
| 4 | CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer aplicativo" que afeta as versões 12 e 13 do Android | https://github.com/007CRIPTOGRAFIA/c-CVE-2024-0044 | POC Details |
| 5 | 利用CVE-2024-0044 在Android12、13 下提权 | https://github.com/Kai2er/CVE-2024-0044-EXP | POC Details |
| 6 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 | https://github.com/hunter24x24/cve_2024_0044 | POC Details |
| 7 | EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience. | https://github.com/nexussecelite/EvilDroid | POC Details |
| 8 | a vulnerability affecting Android version 12 & 13 | https://github.com/nahid0x1/CVE-2024-0044 | POC Details |
| 9 | CVE-2024-0044 | https://github.com/MrW0l05zyn/cve-2024-0044 | POC Details |
| 10 | PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app | https://github.com/canyie/CVE-2024-0044 | POC Details |
| 11 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 | https://github.com/pl4int3xt/CVE-2024-0044 | POC Details |
| 12 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 | https://github.com/0xbinder/CVE-2024-0044 | POC Details |
| 13 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 | https://github.com/Dit-Developers/CVE-2024-0044- | POC Details |
| 14 | EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience. | https://github.com/sridhar-sec/EvilDroid | POC Details |
| 15 | a vulnerability affecting Android version 12 & 13 | https://github.com/nishan0x1/CVE-2024-0044 | POC Details |
| 16 | a vulnerability affecting Android version 12 & 13 | https://github.com/l1ackernishan/CVE-2024-0044 | POC Details |
| 17 | a vulnerability affecting Android version 12 & 13 | https://github.com/l1ackerronin/CVE-2024-0044 | POC Details |
| 18 | Automated Exploit for CVE-2024-0044 . | https://github.com/Athexhacker/EXPLOITER | POC Details |
| 19 | CVE-2024-0044_PoC | https://github.com/HoyoenKim/CVE-2024-0044_PoC | POC Details |
| 20 | a vulnerability affecting Android version 12 & 13 | https://github.com/ronin0x1/CVE-2024-0044 | POC Details |
| 21 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13. This repo demonstrates how to exploit CVE-2024-0044. For educational and testing purposes only. | https://github.com/Dit-Developers/CVE-2024-0044 | POC Details |
| 22 | A robust digital forensics tool for extracting and analyzing Google Chrome artifacts from Android devices | https://github.com/JackTekno/Chrome-Forensic_CVE-2024-0044 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet