DarioI / ARESLinks
ARES: Android Reverse Engineering Suite is a security suite for analyzing Android .apk files.
☆31Updated 8 years ago
Alternatives and similar repositories for ARES
Users that are interested in ARES are comparing it to the libraries listed below
Sorting:
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆79Updated 8 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆109Updated 10 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago
- android apk查壳工具源代码☆17Updated 10 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated 2 years ago
- Check Android device security settings☆85Updated 5 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Updated 10 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆54Updated 8 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- A place for disclosing things☆43Updated 8 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- AAMO: Another Android Malware Obfuscator☆124Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆125Updated 8 years ago
- PoC framework for APK obfuscation☆52Updated 9 years ago
- Android Device Testing Framework ("dtf")☆85Updated 2 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- This application attempts to detect android overlay attacks☆44Updated last year
- Exploit for Android Zip bugs: 8219321, 9695860, and 9950697☆144Updated 11 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆89Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆100Updated 7 years ago
- Runtime memory analysis framework to identify Android malware☆145Updated 7 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- Generic exploit for master key vulnerability in Android☆33Updated 10 years ago
- bash script to facilitate some aspects of an Android application assessment☆158Updated 3 years ago
- Android ADB backup APK Injection POC☆139Updated 9 years ago