From 926e18c160540453661cc391303ba6385b0a07ab Mon Sep 17 00:00:00 2001 From: ClumsyLulz <86472964+SleepTheGod@users.noreply.github.com> Date: Fri, 9 Jan 2026 00:05:23 -0500 Subject: [PATCH] Update readme.md --- readme.md | 35 +++++++++++++++++------------------ 1 file changed, 17 insertions(+), 18 deletions(-) diff --git a/readme.md b/readme.md index 1e6ba9b..869d6ca 100644 --- a/readme.md +++ b/readme.md @@ -1,35 +1,34 @@ ## android-kernel-exploits -Android 漏洞利用代码集合,**均未测试** +A collection of Android kernel vulnerability exploit code, **none tested**. -## 漏洞列表 +## Vulnerability List -### 通用 - Google +### General – Google -* [CVE-2016-5195 - dirtycow proof of concept for Android](general-kernel/CVE-2016-5195) +* [CVE-2016-5195 - Dirty COW proof of concept for Android](general-kernel/CVE-2016-5195) -### 高通 - Qualcomm +### Qualcomm * [CVE-2016-2431 - The Qualcomm TrustZone component in Android before 2016-05-01 on Nexus 5, Nexus 6, Nexus 7 (2013), and Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 24968809](qualcomm/CVE-2016-2431) * [CVE-2016-5342 - Heap-based buffer overflow in the wcnss_wlan_write function](qualcomm/CVE-2016-5342) -### 华为 - Huawei +### Huawei -待整理 +* To be organized -### 三星 - Samsung +### Samsung -* [SVE-2017-10086 - PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP](samsung/SVE-2017-10086) +* [SVE-2017-10086 - PoC exploit for arbitrary file read/write on locked Samsung Android devices via MTP](samsung/SVE-2017-10086) -## 第三方列表 +## Third-Party Lists -* [ScottyBauer/Android_Kernel_CVE_POCs - A list of my CVE's with POCs](https://github.com/ScottyBauer/Android_Kernel_CVE_POCs) -* [ele7enxxh/poc-exp - poc or exp of android vulnerability](https://github.com/ele7enxxh/poc-exp) -* [jiayy/android_vuln_poc-exp - This project contains pocs and exploits for android vulneribilities](https://github.com/jiayy/android_vuln_poc-exp) +* [ScottyBauer/Android_Kernel_CVE_POCs - A list of my CVEs with PoCs](https://github.com/ScottyBauer/Android_Kernel_CVE_POCs) +* [ele7enxxh/poc-exp - PoCs or exploits for Android vulnerabilities](https://github.com/ele7enxxh/poc-exp) +* [jiayy/android_vuln_poc-exp - This project contains PoCs and exploits for Android vulnerabilities](https://github.com/jiayy/android_vuln_poc-exp) -## 第三方工具 - -* [chainfire - 主要是三星设备](https://autoroot.chainfire.eu/) -* [kingroot - 一键root工具](https://kingroot.net/) -* [SunShine - bootloader 解锁 / root 工具](http://theroot.ninja/download.html) +## Third-Party Tools +* [chainfire - Mainly for Samsung devices](https://autoroot.chainfire.eu/) +* [kingroot - One-click root tool](https://kingroot.net/) +* [SunShine - Bootloader unlock / root tool](http://theroot.ninja/download.html)