CheckPointSW / android_appfuzzLinks
☆31Updated 2 years ago
Alternatives and similar repositories for android_appfuzz
Users that are interested in android_appfuzz are comparing it to the libraries listed below
Sorting:
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆65Updated 6 years ago
- ☆58Updated 5 months ago
- ☆90Updated 2 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆123Updated last year
- A portable utility to locate android binder service☆92Updated 5 years ago
- Android Library Code Recognition☆81Updated last year
- ☆102Updated 5 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- My slides☆89Updated 5 years ago
- PoC Frida script to view Android libbinder traffic☆136Updated 10 months ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 4 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 9 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- ☆18Updated 5 years ago
- a simple frida-based fuzzer for skylight based on @ret2systems pwn2own work☆30Updated 6 years ago
- Frida-based general purpose fuzzer☆217Updated 4 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆47Updated 5 years ago
- ☆58Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- Official Dexcalibur documentation☆16Updated 4 years ago