Generic exploit for master key vulnerability in Android
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
AndroidManifest.xml
LICENSE
Makefile
README.md
Superuser.apk
doit.sh
masterkey-apk-inject.sh
rootme.sh
su
undoit.sh

README.md

mkbreak

Generic exploit for master key vulnerability in Android

  • Download and install Android SDK from https://developer.android.com/sdk/index.html

  • Download Superuser from http://androidsu.com/superuser/ then place Superuser.apk and "su" binary for your architecture (usually ARM) in the checkout directory (the same directory doit.sh is in). They should be su and Superuser.apk. Actual download are signed zips, you may unzip and move the files to the dir.

  • Connect your device to USB and enable USB debugging mode. This changes for different versions of Android:

    • For Gingerbread and Froyo: Settings -> Applications -> Development -> USB debugging

    • For ICS: Settings -> Developer options -> Android debugging

  • Run ./doit.sh and follow the instructions

  • Enjoy your freedom and get rid of that annoying bloatware / spyware. May I suggest CyanogenMod (http://cyanogenmod.org/)?

Based on: