{% extends "base.html" %} {% block title %}AUTARCH — RCS/SMS Exploit{% endblock %} {% block content %}
Checking device... Shizuku: -- Archon: -- CVE: -- SMS App: --

SMS Messages

MMS Messages

RCS Provider (AOSP content://rcs/)

Content Provider Enumeration

Scan all known messaging content providers to see which are accessible at UID 2000.

bugle_db Extraction

Extract the Google Messages RCS database. The database is encrypted at rest — raw file extraction also requires the encryption key. Best method: Archon relay (queries from decrypted app context). Fallback: CVE-2024-0044 (app-UID access) → root (DB + keys) → ADB backup.

SQL Query (extracted bugle_db)

Run arbitrary SQL against a previously extracted bugle_db.

Extracted Database Snapshots

Forge SMS Message

Forge RCS Message (via Archon)

Forge Conversation

Import SMS Backup XML

Import from SMS Backup & Restore XML format.

Forge Log

Modify Message

Change Sender

Shift Timestamps

Bulk Actions

Delete Single Message

CVE-2024-0044 — run-as Privilege Escalation

Newline injection in PackageInstallerService allows run-as access to any app's private data. Works on Android 12-13 with security patch before October 2024.

RCS Spoofing

RCS Identity & Signal Protocol

Known RCS CVEs

IMS/RCS Diagnostics

Full Backup

Back up all SMS/MMS/RCS messages from the device. Content providers capture SMS/MMS; Archon relay or bugle_db extraction captures RCS.

Restore / Clone

Set Default SMS App

Saved Backups

Exported Files

SMS/RCS Monitor

Monitor incoming SMS/RCS messages in real-time via logcat interception.

{% endblock %}