Skip to content
Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.
C Assembly C++ Objective-C Makefile Perl Other
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
Documentation
android/configs
arch
block
certs
crypto
drivers
firmware
fs
include
init
ipc
kernel
lib
mm
net
samples
scripts
security
sound
tools
usr
virt
.get_maintainer.ignore
.gitignore
.mailmap
Android.bp
AndroidKernel.mk
COPYING
CREDITS
Kbuild
Kconfig
MAINTAINERS
Makefile
README.md
REPORTING-BUGS
backported-features
build.config.cuttlefish.x86_64
build.config.goldfish.arm
build.config.goldfish.arm64
build.config.goldfish.mips
build.config.goldfish.mips64
build.config.goldfish.x86
build.config.goldfish.x86_64
verity_dev_keys.x509

README.md

An Offensive Android Kernel on Steroids

Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting. It was specifically built for HackRF and Proxmark 3, but later I decided to add other features too. So you download the latest kernel source of Shuriken from here. If you want a prebuilt Zip file to flash it to your Oneplus 5/5T, you can download the raw zImage files and flashable zip from the release section. Currently the Kernel Supports the following features:

  1. External WiFi USB Adapter
  2. HID Emulation
  3. CDC_ACM -> Proxmark/Chameleon Detection (all versions)
  4. Dynamic Module loading
  5. Hackrf/USB Ethernet/DVRs
  6. All other usual features of the Linux

image

You can’t perform that action at this time.