⚠️ EDUCATIONAL PURPOSE ONLY
This project is designed for security research and educational purposes. Use only on devices you own or have explicit permission to test.
Project Phoenix is a complete Android exploitation framework demonstrating a full attack chain:
[Initial Access] → [Sandbox Escape] → [Privilege Escalation] → [Persistence] APK Chrome UAF Kernel UAF Camera RAT
text
| Stage | Technique | CVE | Status |
|---|---|---|---|
| 1️⃣ Initial Access | Malicious APK (Meterpreter) | N/A | ✅ Working |
| 2️⃣ Sandbox Escape | Chrome Portals UAF | CVE-2021-37973 | |
| 3️⃣ Privilege Escalation | Kernel eventpoll UAF | CVE-2021-1048 | |
| 4️⃣ Persistence | Camera RAT Service | N/A | ✅ Working |
Project_Phoenix/ ├── 📁 01_recon/ # Reconnaissance data ├── 📁 02_payloads/ # Generated payloads │ ├── android/ # Android payloads │ ├── linux/ # Linux payloads │ └── windows/ # Windows payloads ├── 📁 03_exploits/ # Exploit source codes │ ├── kernel/ # Kernel exploits │ ├── browser/ # Browser exploits │ └── local/ # Local exploits ├── 📁 04_tools/ # Scripts and tools │ ├── ndk/ # Android NDK (ignored) │ ├── metasploit/ # MSF scripts │ └── scripts/ # Helper scripts ├── 📁 05_logs/ # Execution logs ├── 📁 06_reports/ # Generated reports ├── 🔧 phoenix_dashboard.sh # Main control panel ├── 📄 README.md ├── 📄 LICENSE └── 📄 .gitignore
text
git clone https://github.com/YOUR_USERNAME/Project_Phoenix.git cd Project_Phoenix
chmod +x phoenix_dashboard.sh chmod +x 04_tools/scripts/*.sh
./phoenix_dashboard.sh 📚 Documentation Full documentation available in PHOENIX_MANUAL.md
Prerequisites bash
sudo apt update sudo apt install -y adb fastboot metasploit-framework gcc Basic Usage bash
./04_tools/scripts/phoenix_compile.sh
./04_tools/scripts/phoenix_deploy.sh
adb shell /data/local/tmp/phoenix
./04_tools/scripts/phoenix_report.sh 🛠️ Features ✅ Modular Design - Easy to add new exploits
✅ Automated Compilation - Cross-compile for ARM64/x86-64
✅ One-Click Deployment - Push payloads via ADB
✅ Interactive Dashboard - User-friendly control panel
✅ Comprehensive Logging - Track all activities
✅ Report Generation - Professional documentation
📊 Tested Environments Device Android Kernel Result Infinix X669C 12 4.19.191 ❌ Patched Docker Ubuntu 18.04 - 4.15.0 ✅ Vulnerable Genymotion VM 10 4.14.0 ✅ Vulnerable 🔍 Included Exploits CVE-2021-1048 - Kernel UAF File: 03_exploits/kernel/phoenix_kernel.c
Type: Local Privilege Escalation
Affected: Linux Kernel 4.14 - 5.10
CVE-2021-37973 - Chrome Sandbox Escape File: 03_exploits/browser/phoenix_sandbox.js
Type: Browser Sandbox Escape
Affected: Chrome < 94.0.4606.61
Phoenix RAT - Camera Access File: 02_payloads/android/PhoenixRAT.java
Type: Post-Exploitation Payload
Requires: Root Access
🤝 Contributing Contributions are welcome! Please follow these steps:
Fork the repository
Create a feature branch (git checkout -b feature/AmazingFeature)
Commit your changes (git commit -m 'Add some AmazingFeature')
Push to the branch (git push origin feature/AmazingFeature)
Open a Pull Request
📜 License This project is licensed under the MIT License - see the LICENSE file for details.
The author is not responsible for any misuse of this software. Use it only on devices you own or have explicit written permission to test. Unauthorized access to computer systems is illegal and punishable by law.
🔗 References CVE-2021-1048 Detail
CVE-2021-37973 Detail
Android Security Bulletin
Metasploit Documentation
📞 Contact For educational inquiries only:
Create an issue in this repository
Check the documentation first
Made with 🔥 by Security Researchers | Version 2.0 | April 2026
Contributing to Project Phoenix Thank you for your interest in contributing to Project Phoenix!
🎯 How to Contribute Reporting Bugs Check if the bug is already reported in Issues
Use the bug report template
Include detailed steps to reproduce
Mention your environment (OS, Android version, etc.)
Suggesting Enhancements Describe the enhancement in detail
Explain why it would be useful
Provide example use cases
Pull Requests Fork the repository
Create a feature branch
Write clear commit messages
Test your changes thoroughly
Update documentation if needed
Submit a pull request
📋 Code Style C: Follow Linux kernel coding style
Java: Follow Android coding conventions
JavaScript: Use ES6+ syntax
Bash: Use shellcheck validation
Include proper documentation for each exploit
Test on isolated environments only
Do not submit malware or actual payloads
🔒 Security If you discover a security vulnerability, please:
DO NOT create a public issue
Email the maintainer privately
Allow time for responsible disclosure
✅ Code of Conduct Be respectful and professional
Focus on educational value
No malicious intent
Help others learn
Thank you for contributing responsibly!