Projects STRLCPY eeva Commits c2bb303b
🤬
  • ■ ■ ■ ■ ■
    README.md
    skipped 1 lines
    2 2   
    3 3  E<sup>2</sup>VA is an app allowing for binary exploitation on Android OS. It allows an external user to select and communicate with modules that contain severe vulnerabilities. Therefore, E<sup>2</sup>VA enables research on the applicability of *standard* binary exploitation techniques to Android apps, which call native functions.
    4 4   
    5  -E<sup>2</sup>VA stands for *Exploitation Experience (with) Vulnerable App*. It is the foundation of a series of [blog posts](LINK TO BLOCK POSTS) that describe exploitation of some already existing vulnerable modules. The app runs on a Pixel 3 emulator (without Google Play for root access), running Android 12 (API level 31), and an x86 - 64 architecture. Other setups have not yet been tested!
     5 +E<sup>2</sup>VA stands for *Exploitation Experience (with) Vulnerable App*. It is the foundation of a series of [blog posts](https://lolcads.github.io/posts/2022/11/diving_into_the_art_of_userspace_exploitation_under_android/) that describe exploitation of some already existing vulnerable modules. The app runs on a Pixel 3 emulator (without Google Play for root access), running Android 12 (API level 31), and an x86 - 64 architecture. Other setups have not yet been tested!
    6 6   
    7 7  ## Installation
    8 8   
    skipped 8 lines
    17 17  ### Build via *Android Studio*
    18 18   
    19 19  As this is just the pushed [*Android Studio*](https://developer.android.com/studio) project of E<sup>2</sup>VA, one can just build the app, create own modules, optimize communication between external client and E<sup>2</sup>VA etc.
     20 + 
Please wait...
Page is in error, reload to recover