https://github.com/fuqiuluo/android-wuwa
Android aarch64 kernel rootkit(driver module)
https://github.com/fuqiuluo/android-wuwa
android arm64 driver kernel kernel-module linux-kernel lkm-rootkit rootkit security-audit
Last synced: 4 months ago
JSON representation
Android aarch64 kernel rootkit(driver module)
- Host: GitHub
- URL: https://github.com/fuqiuluo/android-wuwa
- Owner: fuqiuluo
- Created: 2025-07-22T21:04:00.000Z (6 months ago)
- Default Branch: master
- Last Pushed: 2025-10-02T22:02:11.000Z (4 months ago)
- Last Synced: 2025-10-02T23:34:08.612Z (4 months ago)
- Topics: android, arm64, driver, kernel, kernel-module, linux-kernel, lkm-rootkit, rootkit, security-audit
- Language: C
- Homepage: https://deepwiki.com/fuqiuluo/android-wuwa
- Size: 115 KB
- Stars: 87
- Watchers: 2
- Forks: 13
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
[](https://deepwiki.com/fuqiuluo/android-wuwa)
Join Group: 943577597
# Features
- [x] Custom protocol family for user-space (EL0)
- [x] Virtual ⇄ physical address translation for any process
- [x] Physical page descriptor lookup (flags, ref_count, and friends)
- [x] One-step mapping of a process’s virtual memory into a DMA-BUF fd
- [x] Page-table injections that bypass VMA
- [x] Dump a process’s memory map straight to dmesg for easy inspection
- [ ] Low-level page-table permission tweaks plus VMA permission masking
- [x] Arbitrary physical memory read/write
- [ ] Memory-scan traps for stealthy injection protection
- [ ] Cross-process memory remap to build shared memory
- [ ] EL1 channel based on exception vectors
- [x] Kprobe blacklist bypass/disable
- [x] Determine if the process is alive
- [x] Get Module Base Addr
- [x] Get process PID
- [ ] Hide Process
- [x] Give Root
# How to Connect to the WuWa Driver
[Click me](docs/FindDriver.md) for the connection guide.
# Heads-up
- Tested only on my device running kernel 6.1.
- No guarantees on other versions; treat this as a proof of concept.
- Everything not explicitly marked “planned” has been run and verified on my setup—use at your own risk.
# Thanks
- [Diamorphine](https://github.com/m0nad/Diamorphine)
- [kernel-inline-hook-framework](https://github.com/WeiJiLab/kernel-inline-hook-framework)