Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
551[DEV] Collaborative Project: Custom Android ROM for System Exploit Research (ARM64/MT
STAFF TEAM
#1
πŸ“± Hello DF members,

I'm currently working on a **custom Android ROM project** based on **AOSP 13 / LineageOS 20** targeting MTK devices (MediaTek – codename Selene). The focus of the project is:

> βœ… ROM spying on victims
> βœ… Lock all files including home screen (Ransomware)
> βœ… C2 Command and Control Server
> βœ… Install a special apk to track all target activities

The goal is to build a base system that **Spy on the target** expands R/W scope in recovery, and allows embedding of passive modules.

---

πŸ› οΈ **What I've done so far:**
- Built LineageOS fork with root baked in (no need for Magisk).
- Modified recovery to maintain mounted system-as-root.
- Experimenting with injected APKs in `/system/priv-app/` and `post-fs-data`.

---

πŸ”Ž **Looking for collaborators who are into:**
- Exploit chain testing on MTK SoCs
- Custom recovery scripting (init.rc, fstab hacks)
- Embedding post-flash payloads
- Bootloader unlock + boot stage hijack ideas
- ROM "obfuscation" to mimic legit builds

---

πŸ“¬ Hit me up if you're into this kind of playground😏.
STAFF TEAM
#2
I have contacted you
Reply

Reply to this thread