SKRoot - SuperKernelRoot - Linux Kernel Level Perfectly Hidden ROOT Demo
New generation SKRoot, challenge the whole network root detection means, with the mask completely different ideas, get rid of the weakness of the mask is detected, the perfect hidden root function, the whole process does not need to pause SELinux, to achieve the real SELinux 0% touch, universal, pass all the kernel, no kernel source code, direct patch kernel, compatible with Android APP direct JNI call, stable, smooth, no flashback.
The only way for APP application to get ROOT permission is to get ROOT secret key, this key is a 48-bit random string, safe and reliable, if you feel the length is not enough, you can modify the source code to expand the length.
Among them, [inject su to the specified process] only supports to authorize su to the 64-bit APP, the old 32-bit APP is no longer supported, because almost all APPs on the market are 64-bit, such as MT File Manager, Root Explorer File Manager, etc.
1. By dragging and dropping the kernel file set find_proc_pid_status can directly get the entry address of the function proc_pid_status, IDA jump to the address and press F5, the naked eye can get the offset value of cred or seccomp in the task_struct structure (seccomp is a non-essential item).
2. By dragging and dropping the kernel file set find_avc_denied can get the entrance address of the relevant function, IDA jump to the address and press F5, the naked eye jump can get avc_denied entrance location.
3. By dragging and dropping the kernel file set find_do_execve can directly get the entry location of the function do_execve.
4. Start patching the kernel by dragging and dropping the kernel file to patch_kernel_root and entering the above information value, and the ROOT key will be automatically generated until the patch is completed.
5. Start PermissionManager, enter the ROOT key value, and start enjoying the comfortable ROOT environment.
There are many ways to get these 4 values from the kernel file without source code, there are at least 4 of them, in fact, you can search them directly with IDA~, here for your convenience, we made three "script tools" with their source code.



