DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
☆29Jul 4, 2024Updated last year
Alternatives and similar repositories for DVa
Users that are interested in DVa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆15Feb 7, 2024Updated 2 years ago
- Statistically Acceptable GAussian☆14Jul 6, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- APatch and KSU make direct modification of system partitions readable and writable via OverlayFS☆30Dec 17, 2024Updated last year
- Slides of mine.☆12Apr 19, 2024Updated last year
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- KAIST Educational Virtualization☆16Mar 6, 2026Updated last month
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Opencart Bruteforce and Upload Image☆11Aug 13, 2019Updated 6 years ago
- playIntegrityFixDetector is a native app designed to detect modifications, bypasses, or "fixes" applied to the Google Play Integrity API.☆44Mar 24, 2026Updated 2 weeks ago
- ☆17Apr 25, 2020Updated 5 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆44Jan 26, 2024Updated 2 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- The application is a PoC that helps in identifying modern bankers, potentially malicious and remote controlling applications abusing Andr…☆45Jan 14, 2025Updated last year
- ☆22Nov 12, 2022Updated 3 years ago
- PoC for CVE-2024-38399☆25Sep 25, 2025Updated 6 months ago
- Detect the browser versions available on your system, and launch them in an isolated profile for automation & testing purposes.☆26Nov 4, 2025Updated 5 months ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 6 months ago
- Debloat List☆15Feb 6, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Лаунчер для русификаторов множества различных игр.☆16Aug 12, 2025Updated 7 months ago
- Disable MIUI swipe-to-kill☆14May 15, 2024Updated last year
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- ☆18Jun 2, 2024Updated last year
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- Automate buying Amazon Gift Cards☆10Jan 15, 2019Updated 7 years ago
- Time-travel Testing☆106Jul 4, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆16Jan 31, 2026Updated 2 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- ☆15Dec 2, 2025Updated 4 months ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Lightweight inline hook library for RISC-V 64 / 适用于 RISC-V 64 的轻量级 Inline Hook 库☆24Dec 10, 2025Updated 4 months ago