CyberHatcoil / ACF
Android Connections Forensics
☆33Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for ACF
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆42Updated 8 years ago
- Forensic data extraction and decoding tool for Android devices☆33Updated 11 years ago
- Tool used for dumping memory from Android devices☆66Updated 9 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 3 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆102Updated 9 years ago
- Android Data Extractor Lite☆128Updated 9 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆34Updated 9 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆16Updated 2 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆186Updated 9 years ago
- Native Android software for dumping memory from Android processes☆14Updated 10 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- ADB Based Acquisition Tool for Android Forensics☆40Updated 3 years ago
- Android Device Testing Framework ("dtf")☆85Updated last year
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- ☆17Updated 3 years ago
- ☆24Updated 7 years ago
- This website will be holding list / details of each and every tool available via Android Tamer☆27Updated 2 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆51Updated 10 years ago
- Stagefright Android exploit☆17Updated 2 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆25Updated 9 years ago
- repo with compromised keys and such☆20Updated last year
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Updated 9 years ago
- Bypassing Android Pattern Lock☆64Updated 10 years ago