unlocked-bootloader-backdoor-demo
adguardcert
unlocked-bootloader-backdoor-demo | adguardcert | |
---|---|---|
3 | 3 | |
32 | 267 | |
- | 9.4% | |
0.0 | 6.6 | |
almost 3 years ago | about 1 month ago | |
C++ | Shell | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
unlocked-bootloader-backdoor-demo
-
How android gets more vulnerable when rooted when it's still a Linux based OS ?
I actually made a proof-of-concept: https://github.com/LuigiVampa92/unlocked-bootloader-backdoor-demo
-
Should I be paranoid about security and privacy on Lineage OS 17.1?
It is possible. The only required thing is an unlocked bootloader, once you have it and you have a few minutes of physical access to the device you can install a persistent backdoor. No matter if there is a stock or a custom ROM on the device, no matter if there is root installed or not, no matter if device is encrypted or not. I even made a small proof of concept - you can check it here, just be careful and make a backup of partitions
-
LineageOS (in)security
I have made a research and created a proof-of-concept how an android device with an unlocked bootloader (which means that we talk about almost any device using custom ROM, root, etc) in case an adversary has a temporary physical access to it (a couple of minutes is enough) can be silently injected with a backdoor that will be successfully installed in almost any case, no matter which OS version it has, no matter if it’s encrypted or not, no matter if it has root or not. I have written an article about it. You can check it here (I’m sorry, it’s only in russian, but the google translate should work) and get the code here to test it yourself.
adguardcert
- It's been months since adguard block ads, anyone know why?
-
Google Chrome
You need to use the "Adguard Certificate" magisk module to MitM Google apps now. The download is under releases on their github page: https://github.com/AdguardTeam/adguardcert
-
recommendations - rooted pixel 6 pro - lifetime adguard using local proxy - need your expertise
Use the official certificate from adguard here. See if it fixes your problems. I've got no issues with my pixel 5a
What are some alternatives?
magisk-drm-disabler - Read-only mirror from GitLab. A Magisk module designed to disable DRM completely on Android
safetynet-fix - Google SafetyNet attestation workarounds for Magisk
mtk-easy-su - Get bootless root access with few clicks.
DnsLibs - DNS filtering library that's used in AdGuard products
adb_root - Magisk Module that allows you to run "adb root". Android 10 only. Probably will work with Android 9. Definitely not with Android 11/12.
PixelFeatureDrops - Magisk Module for Pixel Feature Drops that adds the system files for the same and spoof using the latest device fingerprint from Google Pixel .
adduser-dll - Simple DLL that add a user to the local Administrators group
MagiskHidePropsConf - This tool is now dead...
Pixel-Launcher-Extended - Pixel Launcher Extended is a Magisk module by TeamFiles with many cool features.