"Root" via dirtyc0w privilege escalation exploit (automation script) / Android (32 bit)
I put ''root'' in quotes, because technically, it isn''t rooting. However, it creates a binary called ''run-as'' that can execute packages as root.
"Root" via dirtyc0w privilege escalation exploit (automation script) / Android (32 bit)
I put ''root'' in quotes, because technically, it isn''t rooting. However, it creates a binary called ''run-as'' that can execute packages as root.