E3V3A / snoopsnitch
SRLabs SnoopSnitch fork as of 2016-10-19
☆15Updated 7 years ago
Related projects: ⓘ
- Tool used for dumping memory from Android devices☆65Updated 9 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Bypass signature and permission checks for IPCs☆82Updated 10 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆65Updated 5 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆14Updated 9 years ago
- Vulnerability Reports by Aleph Research☆34Updated 6 months ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- Generic exploit for master key vulnerability in Android☆33Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- ☆24Updated 6 years ago
- Port Scapy to iOS☆27Updated 10 years ago
- ☆13Updated this week
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆28Updated last year
- Android Device Testing Framework ("dtf")☆85Updated last year
- ☆22Updated 5 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Android Connections Forensics☆33Updated 8 years ago
- ☆93Updated 7 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆100Updated 9 years ago
- ☆39Updated this week
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- ☆31Updated 8 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆40Updated 8 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆71Updated last year
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆21Updated last year
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 6 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆89Updated 8 years ago
- Module for Xposed framework to allow sending of raw SMS PDUs☆22Updated 9 years ago