LaurieWired / Medusa_Android_DockerLinks
Run the Medusa Android framework inside a docker container on x86 or ARM
☆37Updated 2 years ago
Alternatives and similar repositories for Medusa_Android_Docker
Users that are interested in Medusa_Android_Docker are comparing it to the libraries listed below
Sorting:
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆37Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆58Updated last year
- Slides and videos from my public speeches / conferences☆78Updated 3 weeks ago
- A list of bizarre crackmes☆135Updated last month
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Type diagram plugin for JADX decompiler☆72Updated 2 weeks ago
- A burp for intents wannabe☆78Updated last year
- This contains notes, slides, and code for my Infosec World talk☆17Updated 2 years ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- ☆20Updated 2 years ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆118Updated 2 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆185Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆39Updated 8 months ago
- Real Android malware apps discussed in the book☆44Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆134Updated last year
- Oversecured Vulnerable iOS App☆230Updated last year
- My talks and papers☆40Updated last month
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- ☆82Updated 2 weeks ago
- Tools to bypass flawed SELinux policies using the init_module system call☆58Updated 2 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆33Updated last year
- This contains notes, slides, and code for my Strange Loop talk☆30Updated 2 years ago
- This repository explain how to write frida hook scripts and analysis written hooks.☆87Updated 2 years ago
- Transparent Proxy via Frida hooks☆35Updated 2 years ago
- This contains notes and slides for my Objective by the Sea talk☆97Updated 2 years ago
- ☆93Updated 3 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆11Updated last year
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆12Updated 2 years ago