CheckPointSW / android_appfuzzLinks
☆32Updated 2 years ago
Alternatives and similar repositories for android_appfuzz
Users that are interested in android_appfuzz are comparing it to the libraries listed below
Sorting:
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆68Updated 6 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 6 years ago
- ☆90Updated 3 years ago
- A portable utility to locate android binder service☆97Updated 6 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆126Updated 2 years ago
- ☆61Updated 10 months ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- Frida-based general purpose fuzzer☆220Updated 5 years ago
- ☆106Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆155Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- GDB plugin peda for arm☆146Updated 2 months ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Updated 3 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- ☆58Updated 4 years ago
- A bunch of JEB python scripts☆45Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46Updated 5 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- ☆18Updated 6 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆287Updated 4 months ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆40Updated 2 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆185Updated 4 years ago
- My slides☆89Updated 6 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- ☆172Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- ☆32Updated 5 years ago
- A gdb like debugger that provide a runtime env to unicorn emulator and additionals features!☆193Updated 2 years ago