Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
525Collaborative Project: Custom Android ROM for System Exploit Research (ARM64/MTK)
STAFF TEAM
#1
Exclamation 
Hi, DarkForums Community  CringeHarold
 
I'm currently working on a custom Android ROM project based on AOSP 13 / LineageOS 20 targeting MTK devices (MediaTek – codename Selene).

The focus of the project is
 
> ✅ ROM spying on victims
> ✅ Lock all files including home screen (Ransomware)
> ✅ C2 Command and Control Server
> ✅ Install a special apk to track all target activities
 
The goal is to build a base system that Spy on the target expands R/W scope in recovery, and allows embedding of passive modules.
 
 
 
🛠️ What I've done so far
- Built LineageOS fork with root baked in (no need for Magisk).
- Modified recovery to maintain mounted system-as-root.
- Experimenting with injected APKs in /system/priv-app/ and post-fs-data.
 
 
 
🔎 Looking for collaborators who are into
- Exploit chain testing on MTK SoCs
- Custom recovery scripting (init.rc, fstab hacks)
- Embedding post-flash payloads
- Bootloader unlock + boot stage hijack ideas
- ROM obfuscation to mimic legit builds

CONTACT
[-] The following 1 user Likes ClayOxtymus1337's post:
  • TheEndofEverything

Reply to this thread