• Latest 1a138a2bd0

    sssnake released this 2026-03-14 09:45:14 +00:00 | 13 commits to main since this release

    RCS/SMS Exploitation v2.0 (complete rewrite)

    • bugle_db extraction — Google Messages database is encrypted at rest; module handles key extraction, Archon relay (decrypted app context), CVE-2024-0044 (app-UID access), root + key material pull

    • AOSP RCS provider — queries content://rcs/ for threads, messages, participants, file transfers

    • CVE-2024-0044 exploit — run-as privilege escalation for Android 12-13 (pre-Oct 2024 patch)

    • 7-tab web UI — Extract, Database, Forge, Modify, Exploit, Backup, Monitor

    • SQL query interface — run arbitrary SQL against extracted bugle_db with preset queries

    • Full backup/restore/clone — JSON, CSV, XML (SMS Backup & Restore format)

    • Known CVE database — https://github.com/advisories/GHSA-5pgr-37hm-gqpw, https://github.com/advisories/GHSA-g67j-78ch-4v54, https://github.com/advisories/GHSA-frwr-8p82-qrjm

    • IMS/RCS diagnostics — dumpsys telephony_ims, carrier config, Phenotype verbose logging

    • SMS/RCS monitor — real-time logcat interception

    • Archon Android App v2.0.0

    • RCS Messaging module with Shizuku integration (replaces Links tab)

    • bugle_db access — encrypted database extraction + key material + decrypted message dump

    • RCS account info — IMS registration, carrier RCS config, Google Messages prefs

    • 16 module actions — forge, export, search, intercept, extract, dump, clone identity

    New Modules

    • Starlink Hack — gRPC enumeration, firmware CVE check, RF analysis, network attacks
    • SMS Forge — fake SMS backup creation with templates, chat bubble preview
    • SDR Drone Detection — 2.4/5.8 GHz, 900 MHz, 433 MHz band scanning
    • Infrastructure

    Updated Linux and Windows manuals to v2.3

    Downloads