Skip to content

πŸ” Detects and mitigates vulnerabilities in `ApplicationInfo` handling, ensuring secure app resource access and preventing unauthorized data exposure.

Notifications You must be signed in to change notification settings

Dhanishh985/ResourcePoison

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸš€ ResourcePoison - Easy Privilege Escalation for Android Apps

πŸ“₯ Download Now!

Download ResourcePoison


🌐 Introduction

ResourcePoison is a comprehensive solution that demonstrates a privilege escalation vulnerability in Android applications, specifically targeting CVE-2025-22441. This vulnerability allows an installed app to gain unauthorized access to the SystemUI process. With this tool, users can explore the risks associated with the vulnerability and understand how to protect their devices.

πŸ” Features

  • User-Friendly Interface: Navigate easily without technical knowledge.
  • Visual Guides: Step-by-step instructions simplify the process.
  • Educational Resources: Learn about privilege escalation and its impacts.
  • Compatibility: Designed to work with various versions of Android.

πŸ“¦ System Requirements

To run ResourcePoison effectively, ensure that your device meets the following requirements:

  • Operating System: Android 8.0 (Oreo) or higher.
  • Storage Space: Minimum of 100 MB free space.
  • Permissions: Access to install applications from unknown sources.

πŸš€ Getting Started

  1. Download the Application
    Visit this page to download: Download ResourcePoison.

  2. Install the Application

    • Open the downloaded file.
    • Follow the prompts to install the application on your Android device.
  3. Enable Unknown Sources
    Before installation, ensure that your device allows apps from unknown sources:

    • Go to Settings > Security.
    • Toggle Unknown Sources to enable.
  4. Open ResourcePoison
    Locate the app in your app drawer and tap to open it.

  5. Follow the Instructions
    Once open, the application will guide you through the available features and how to test for the vulnerability.

πŸ”§ Usage Instructions

  • Navigating the App: After the installation, ResourcePoison provides a straightforward menu. Select options to learn about privilege escalation or test vulnerable apps.
  • Testing: Use the built-in testing feature to scan applications for the specified vulnerabilities.
  • Educational Content: Access resources to understand how exploitation works and how to secure your apps.

πŸ› οΈ Troubleshooting

If you experience issues while using ResourcePoison, try the following solutions:

  • Installation Issues: Ensure you have allowed installations from unknown sources.
  • App Crashes: Restart your device and attempt to open the application again.
  • Vulnerability Not Detected: Ensure you are using compatible Android versions and the apps you are testing are vulnerable.

πŸ“„ Documentation & Support

For detailed documentation and further support:

πŸ”— Additional Resources

  • Learn About CVE-2025-22441: Explore the technical details behind the vulnerability.
  • Explore Other Security Tools: Discover additional resources that can enhance your understanding of Android security.

πŸ‘₯ Community Contribution

We welcome contributions to improve ResourcePoison. If you have suggestions or bug reports, please create a new issue.

πŸ”’ Safety Precautions

Always ensure you understand the risks associated with testing applications for vulnerabilities. Only test apps you own or have explicit permission to analyze. Use this tool responsibly and ethically.

βš™οΈ Updates

We regularly release updates to improve performance and introduce new features. Check for updates periodically on our Releases page.


πŸ“₯ Download & Install

To start using ResourcePoison, visit this page to download: Download ResourcePoison.

Thank you for choosing ResourcePoison! Enjoy exploring and learning about application security.

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages