CheckPointSW / android_appfuzzLinks
☆31Updated 2 years ago
Alternatives and similar repositories for android_appfuzz
Users that are interested in android_appfuzz are comparing it to the libraries listed below
Sorting:
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆68Updated 6 years ago
- ☆90Updated 3 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- A portable utility to locate android binder service☆97Updated 6 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- ☆106Updated 5 years ago
- ☆61Updated 10 months ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆126Updated 2 years ago
- My slides☆89Updated 6 years ago
- Frida-based general purpose fuzzer☆220Updated 5 years ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46Updated 5 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆155Updated 5 years ago
- A bunch of JEB python scripts☆44Updated 4 years ago
- USB device fuzzing on Android Phone☆33Updated 4 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Android Library Code Recognition☆83Updated last year
- GDB plugin peda for arm☆146Updated last month
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- PoC Frida script to view Android libbinder traffic☆140Updated last year
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- ☆41Updated 8 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Updated 9 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184Updated 4 years ago
- PoC code for CVE-2017-13253☆37Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- ☆58Updated 4 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- ☆18Updated 5 years ago