A root tool based on the [CVE-2015-1805 vulnerability](https://access.redhat.com/security/cve/cve-2015-1805) It supports 32 and 64bit, get sys call table address via swi.Inspired by [dosomder/iovyroot] (https://github.com/dosomder/iovyroot)
A root tool based on the [CVE-2015-1805 vulnerability](https://access.redhat.com/security/cve/cve-2015-1805)
It supports 32 and 64bit, get sys call table address via swi. ref to [Getting sys_call_table on Android](https://www.nowsecure.com/blog/2013/03/13/getting-sys-call-table-on-android/)
[4.0K] /data/pocs/429c63be5b8ee2691a25302ef18d919f5b3807c1
├── [4.0K] jni
│ ├── [ 843] Android.mk
│ ├── [ 41] Application.mk
│ ├── [4.0K] common
│ │ ├── [ 315] Android.mk
│ │ ├── [1.9K] exp_sys_call.c
│ │ ├── [ 999] exp_sys_call.h
│ │ ├── [6.7K] getroot.c
│ │ ├── [ 337] getroot.h
│ │ ├── [1.2K] kallsyms.c
│ │ ├── [ 960] kallsyms.h
│ │ ├── [1.3K] log.h
│ │ └── [3.1K] threadinfo.h
│ ├── [4.0K] expIov
│ │ ├── [ 325] Android.mk
│ │ ├── [ 139] exp_iov.h
│ │ ├── [2.3K] flex_array.c
│ │ ├── [4.0K] include
│ │ │ └── [1.5K] flex_array.h
│ │ └── [6.5K] iov_exp_main.c
│ └── [ 522] main.cpp
└── [ 364] README.md
4 directories, 18 files