Fuzion24 / AndroidIntentFuzzerLinks
Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)
☆15Updated 10 years ago
Alternatives and similar repositories for AndroidIntentFuzzer
Users that are interested in AndroidIntentFuzzer are comparing it to the libraries listed below
Sorting:
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- ☆44Updated 10 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆30Updated 11 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- USB MTP device stack and utilities☆8Updated 8 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆41Updated 2 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- ☆28Updated 7 years ago
- A tool to log method's parameters and return value.☆33Updated 10 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆42Updated 3 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 7 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- JEB Scripts☆21Updated 10 years ago
- CapFuzz - capture, fuzz & intercept web traffic.☆64Updated 5 years ago
- ☆19Updated 11 years ago
- A demo app vulnerable to directory traversal☆15Updated 5 years ago
- Generic exploit for master key vulnerability in Android☆33Updated 10 years ago
- A smali emulator.☆25Updated 6 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- template☆22Updated 6 years ago
- Test Android Application.☆19Updated 9 years ago