0-14N / NDroid
A dynamic information flow tracing system for Android
☆53Updated 3 years ago
Related projects: ⓘ
- Symbolic Execution of Android Framework☆14Updated 7 years ago
- Run android with S2E☆32Updated 9 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 8 years ago
- An Android port of radamsa fuzzer☆64Updated 4 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 8 years ago
- ☆43Updated this week
- ☆33Updated 9 years ago
- ☆39Updated this week
- The Static Android Analysis Framework.☆36Updated 8 years ago
- reproduce the experiment in the report.☆27Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 5 years ago
- Fuzzing framework for third part library of android system☆21Updated 7 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆45Updated 7 years ago
- An Android port of the general purpose honggfuzz fuzzer☆17Updated 9 years ago
- ☆32Updated this week
- ☆31Updated 8 years ago
- ☆38Updated 8 years ago
- cve-2014-4323 poc☆23Updated 8 years ago
- The slides and exploit of mosec2016☆112Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 8 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 6 years ago
- statically vetting android apps based soot☆19Updated 8 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 5 years ago
- CVE-2015-3636 exploit☆43Updated 8 years ago
- ☆49Updated this week
- code emulator base on unicorn engine☆50Updated 6 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago