
Security News
curl Shuts Down Bug Bounty Program After Flood of AI Slop Reports
A surge of AI-generated vulnerability reports has pushed open source maintainers to rethink bug bounties and tighten security disclosure processes.
aeroot
Advanced tools

AERoot is a command line tool that allows you to give the root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
This project is a rewrite from scratch of the android-emuroot tool (https://github.com/airbus-seclab/android_emuroot). It comes with new features:
- Recent AVDs support (Android API > 27)
- Execution time optimization
- Selection of a process by its PID
| Kernel | x86 | x86_64 | Android version |
|---|---|---|---|
| 3.10.0+ | âś“ | 7.0 / 7.1 | |
| 3.18.56+ | âś“ | 8.0 | |
| 3.18.91+ | âś“ | 8.1 | |
| 4.4.124+ | âś“ | âś“ | 9.0 |
| 4.14.112+ | âś“ | âś“ | 9.0 + 10.0 (TV / Automotive) |
| 5.4.36-00815-g3b29042c17b1 | âś“ | âś“ | 10.0 |
| 5.4.43-00621-g90087296b3b1 | âś“ | âś“ | 10.0 |
| 5.4.47-01061-g22e35a1de440 | âś“ | âś“ | 10.0 |
| 5.4.54-android11-0-00619-g476c942d9b3e-ab6722723 | âś“ | âś“ | 11.0 |
| 5.4.61-android11-0-00791-gbad091cc4bf3-ab6833933 | âś“ | âś“ | 11.0 |
| 5.4.61-android11-2-00064-g4271ad6e8ade-ab6991359 | âś“ | 11.0 | |
| 5.4.86-android11-2-00006-gae78026f427c-ab7595864 | âś“ | 11.0 (Automotive) | |
| 5.4.86-android11-2-00040-g29b2beadc627-ab7157994 | âś“ | âś“ | 11.0 (TV / Automotive) |
| 5.10.4-android12-0-03442-gf2684370d34d-ab7068937 | âś“ | 12.0 | |
| 5.10.15-android12-0-01814-gfca78df78ef2-ab7137072 | âś“ | 12.0 | |
| 5.10.21-android12-0-01012-gcc574f0d3698-ab7214561 | âś“ | 12.0 | |
| 5.10.21-android12-0-01145-ge82381ad9a3f-ab7230153 | âś“ | 12.0 | |
| 5.10.35-android12-4-00865-gd9d0c09e0a3b-ab7349034 | âś“ | 12.0 | |
| 5.10.43-android12-6-00231-g54e7412d4ff9-ab7460289 | âś“ | 12.0 | |
| 5.10.43-android12-9-00001-ga30f38980440-ab7882141 | âś“ | 12.0 | |
| 5.10.66-android12-9-00022-g2d6a43c0364d-ab7992900 | âś“ | 12.0 (TV) | |
| 5.10.66-android12-9-00041-gfa9c9074531e-ab7914766 | âś“ | 12.0 | |
| 5.10.102-android13-0-00549-g255b30f804ac-ab8238117 | âś“ | âś“ | 13.0 + 13.0 (TV) |
| 5.10.107-android13-2-00451-g7ba447d0399b-ab8409457 | âś“ | 13.0 | |
| 5.15.32-android13-3-00067-g7b5e736d7c63-ab8474665 | âś“ | 13.0 | |
| 5.15.41-android13-6-02245-g158384f20d1e-ab8610100 | âś“ | 13.0 | |
| 5.15.41-android13-8-00205-gf1bf82c3dacd-ab8747247 | âś“ | 13.0 | |
| 5.15.41-android13-8-00055-g4f5025129fe8-ab8949913 | âś“ | 13.0 | |
| 5.15.83-android14-5-00138-g5e28b848962c-ab9412825 | âś“ | 14.0 | |
| 6.1.12-android14-0-00356-g116e1532b95d-ab9618665 | âś“ | 14.0 | |
| 6.1.21-android14-3-01811-g9e35a21ec03f-ab9850788 | âś“ | 14.0 | |
| 6.1.23-android14-4-00257-g7e35917775b8-ab9964412 | âś“ | 14.0 |
AERoot requires gdb (with Python support enabled) to run properly.
pip install aeroot
git clone https://github.com/quarkslab/AERoot.git
python3 setup.py install --user
A Docker image of AERoot is available on dockerhub.
Also, you can build an image by yourself:
docker build -t aeroot https://github.com/quarkslab/AERoot.git
docker run --rm \
-v $HOME/.emulator_console_auth_token:$HOME/.emulator_console_auth_token \
--network host \
ha0ris/aeroot [aeroot options]
docker run --rm \
-v $HOME/.emulator_console_auth_token:$HOME/.emulator_console_auth_token \
--network host \
ha0ris/aeroot daemon
docker run --rm \
-v $HOME/.emulator_console_auth_token:$HOME/.emulator_console_auth_token \
ha0ris/aeroot --host host.docker.internal [aeroot options]
docker run --rm \
-v $HOME/.emulator_console_auth_token:$HOME/.emulator_console_auth_token \
ha0ris/aeroot --host host.docker.internal daemon
First of all, you must launch the Android emulator with the gdb qemu option (-qemu -s).
emulator @Your_AVD -qemu -s
Then run aeroot by choosing the mode among:
aeroot [-h] [--verbose | --quiet] [--device DEVICE] [--host HOST] [--port PORT] {name,pid,daemon} ...
aeroot pid 1337
Gives the root privileges to the process with pid 1337
aeroot name my_process
Gives the root privileges to the process named "my_process"
aeroot daemon
Gives the root privileges to the ADB daemon
You can find additional options by checking the help of the tool: aeroot -h
FAQs
Android Emulator Rooting system
We found that aeroot demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
A surge of AI-generated vulnerability reports has pushed open source maintainers to rethink bug bounties and tighten security disclosure processes.

Product
Scan results now load faster and remain consistent over time, with stable URLs and on-demand rescans for fresh security data.

Product
Socket's new Alert Details page is designed to surface more context, with a clearer layout, reachability dependency chains, and structured review.