[DEV] Collaborative Project: Custom Android ROM for System Exploit Research (ARM64/MT
by TheEndofEverything - 13-06-25, 11:25 PM
#1
πŸ“± Hello DF members,

I'm currently working on a **custom Android ROM project** based on **AOSP 13 / LineageOS 20** targeting MTK devices (MediaTek – codename Selene). The focus of the project is:

> βœ… ROM spying on victims
> βœ… Lock all files including home screen (Ransomware)
> βœ… C2 Command and Control Server
> βœ… Install a special apk to track all target activities

The goal is to build a base system that **Spy on the target** expands R/W scope in recovery, and allows embedding of passive modules.

---

πŸ› οΈ **What I've done so far:**
- Built LineageOS fork with root baked in (no need for Magisk).
- Modified recovery to maintain mounted system-as-root.
- Experimenting with injected APKs in `/system/priv-app/` and `post-fs-data`.

---

πŸ”Ž **Looking for collaborators who are into:**
- Exploit chain testing on MTK SoCs
- Custom recovery scripting (init.rc, fstab hacks)
- Embedding post-flash payloads
- Bootloader unlock + boot stage hijack ideas
- ROM "obfuscation" to mimic legit builds

---

πŸ“¬ Hit me up if you're into this kind of playground😏.
Reply
#2
I have contacted you
Reply


Forum Jump:


 Users browsing this thread: 2 Guest(s)