Areizen / Android-Malware-Sandbox
Android Malware Sandbox
☆282Updated 2 years ago
Alternatives and similar repositories for Android-Malware-Sandbox:
Users that are interested in Android-Malware-Sandbox are comparing it to the libraries listed below
- Property extractor for Android apps☆276Updated 3 months ago
- Popular Android threats in 2019☆249Updated 5 years ago
- Mobile security trainings based on android☆104Updated 4 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆201Updated last year
- This repo aims at providing practical examples on how to use r2frida☆199Updated 4 years ago
- Popular Android malware seen in 2020☆290Updated 4 years ago
- Defeat Java packers via Frida instrumentation☆198Updated 2 years ago
- An Android CTF practice challenge☆111Updated 5 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆338Updated last year
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆135Updated 8 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆312Updated last year
- My own collection of Frida scripts and tricks☆67Updated 3 years ago
- Collection of Android reverse engineering scripts☆414Updated 4 years ago
- Django application that performs SAST and Malware Analysis for Android APKs☆206Updated last month
- Python API Monitor for Android apps☆54Updated 6 months ago
- Miscellaneous code☆101Updated 2 weeks ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆98Updated 3 years ago
- Android malware threats that spread in 2018☆44Updated 5 years ago
- A framework for automated extraction of static and dynamic features from Android applications☆357Updated 2 years ago
- PoC Frida script to view Android libbinder traffic☆134Updated 6 months ago
- Popular Android malware for 2021☆40Updated 2 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆158Updated 4 years ago
- Analysis scripts for Ghidra to work with Android NDK libraries.☆328Updated 2 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆573Updated 4 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆141Updated last year
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆114Updated 4 years ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆208Updated 10 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆125Updated 4 years ago
- soFrida - Dynamic Analysis Tool for Mobile Applications☆105Updated 4 years ago
- Examples of using frida to hook android apps☆168Updated 2 years ago