DigiJ
30551a3c53
Archon: add CVE-2025-48543 ExploitManager for locked-bootloader RCS extraction
...
ExploitManager.kt (new, 430 lines):
- CVE-2025-48543 ART UAF → system UID (1000) exploit orchestration
- checkVulnerability(): SDK + patch level gate (Android 13-16 < Sep 2025)
- extractRcsDatabase(): full pipeline — deploy binary, write extraction
script, execute exploit, collect bugle_db + WAL + shared_prefs + files
- extractAppData(pkg): extract any app's /data/data/ via system UID
- executeCustomTask(script): run arbitrary script at system privilege
- Tries direct exec first, falls back to PrivilegeManager (Shizuku/shell)
- Exploit binary loaded from assets or /data/local/tmp/ (push via ADB)
- cleanup(): removes all exploit artifacts
MessagingModule: 5 new actions:
- check_vuln, exploit_rcs, exploit_app:<pkg>, exploit_status, exploit_cleanup
No bootloader unlock needed. No root needed. Locked bootloader compatible.
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 14:44:07 -08:00
DigiJ
81357b71f2
Archon: add bugle_db encrypted database access and RCS account extraction
...
ShizukuManager:
- extractBugleDbRaw(): copies encrypted bugle_db + WAL + shared_prefs + files
- extractEncryptionKeyMaterial(): reads crypto-related shared_prefs for key recovery
- dumpDecryptedMessages(): queries content://rcs/ and SMS providers for decrypted data
- getRcsAccountInfo(): IMS registration, carrier RCS config, Google Messages prefs
- getGoogleMessagesInfo(): version, UID, package info
- parseContentRow(): proper content query output parser
MessagingModule: 6 new actions:
- rcs_account, extract_bugle_db, dump_decrypted, extract_keys, gmsg_info
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 14:07:35 -08:00
DigiJ
cdde8717d0
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
...
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:59 -08:00
DigiJ
ffe47c51b5
Initial public release — AUTARCH v1.0.0
...
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00