Framework for static and dynamic analysis in Android APKs
☆32Jul 25, 2017Updated 8 years ago
Alternatives and similar repositories for AndroidSwissKnife
Users that are interested in AndroidSwissKnife are comparing it to the libraries listed below
Sorting:
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- ☆10Jan 2, 2016Updated 10 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- ☆16Nov 5, 2015Updated 10 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- android malware detection☆12Mar 16, 2016Updated 10 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- Dalvik Monitoring Framework for CuckooDroid☆92Jul 29, 2016Updated 9 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Dynamic Process name change for Android Apps☆28Oct 17, 2020Updated 5 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- Xposed module for obtaining SQLCipher crypto keys☆39Dec 6, 2017Updated 8 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- ☆13Aug 1, 2017Updated 8 years ago
- Security Scanner for OSX☆43Oct 4, 2015Updated 10 years ago
- Android Emulator for mobile security testing☆226Nov 14, 2021Updated 4 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Integer overflow in IOHIDDevice/IOUSBHIDDevice☆20Jun 3, 2016Updated 9 years ago