LaurieWired / Medusa_Android_DockerLinks
Run the Medusa Android framework inside a docker container on x86 or ARM
☆39Updated 2 years ago
Alternatives and similar repositories for Medusa_Android_Docker
Users that are interested in Medusa_Android_Docker are comparing it to the libraries listed below
Sorting:
- This contains notes and code for my Troopers23 Beyond Java talk☆23Updated 2 years ago
- Smali reference for reverse engineering Dalvik Bytecode☆40Updated 2 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- Slides and videos from my public speeches / conferences☆83Updated last week
- Detect code obfuscation through text classification in the detection process.☆45Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆60Updated this week
- A list of bizarre crackmes☆145Updated this week
- A burp for intents wannabe☆78Updated last year
- ☆86Updated last week
- Type diagram plugin for JADX decompiler☆74Updated last month
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated 2 years ago
- This contains notes and slides for my Objective by the Sea talk☆97Updated 2 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆191Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- My talks and papers☆40Updated 2 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Updated 10 months ago
- ☆21Updated 2 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Updated 2 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆93Updated last year
- This contains notes, slides, and code for my Infosec World talk☆17Updated 2 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆33Updated last year
- Transparent Proxy via Frida hooks☆35Updated 2 years ago
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆29Updated last year
- A guide to choosing between different Android Emulator options for Reverse Engineers☆121Updated 3 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆136Updated last year
- Extracting unpacked dec files from running application using frida.☆45Updated 2 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated 2 years ago
- Oversecured Vulnerable iOS App☆231Updated 2 years ago
- ☆63Updated last year
- ☆26Updated 3 years ago