2024-11-28 19:31:51 +01:00
[
{
"id" : 591041270 ,
"name" : "K0mraid3s-System-Shell-PREBUILT" ,
"full_name" : "k0mraid3\/K0mraid3s-System-Shell-PREBUILT" ,
"owner" : {
"login" : "k0mraid3" ,
"id" : 62849592 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62849592?v=4" ,
"html_url" : "https:\/\/github.com\/k0mraid3" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/k0mraid3\/K0mraid3s-System-Shell-PREBUILT" ,
"description" : "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. " ,
"fork" : false ,
"created_at" : "2023-01-19T19:47:13Z" ,
2024-12-05 13:32:55 +01:00
"updated_at" : "2024-12-05T09:20:07Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2024-03-20T19:12:39Z" ,
2024-12-05 13:32:55 +01:00
"stargazers_count" : 77 ,
"watchers_count" : 77 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 15 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : true ,
"topics" : [
"adb" ,
"android" ,
"exploit" ,
"samsung" ,
"shell" ,
"system"
] ,
"visibility" : "public" ,
"forks" : 15 ,
2024-12-05 13:32:55 +01:00
"watchers" : 77 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
2024-12-08 01:31:53 +01:00
"subscribers_count" : 12
2024-11-28 19:31:51 +01:00
}
]