LaurieWired / Medusa_Android_DockerLinks
Run the Medusa Android framework inside a docker container on x86 or ARM
☆36Updated 2 years ago
Alternatives and similar repositories for Medusa_Android_Docker
Users that are interested in Medusa_Android_Docker are comparing it to the libraries listed below
Sorting:
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆36Updated 2 years ago
- Slides and videos from my public speeches / conferences☆76Updated 5 months ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆57Updated last year
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- A burp for intents wannabe☆73Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- A list of bizarre crackmes☆126Updated 4 months ago
- Type diagram plugin for JADX decompiler☆67Updated this week
- This contains notes and slides for my Objective by the Sea talk☆95Updated 2 years ago
- ☆94Updated 3 years ago
- This contains notes, slides, and code for my Infosec World talk☆16Updated 2 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆34Updated last year
- ☆20Updated 2 years ago
- Oversecured Vulnerable iOS App☆230Updated last year
- My talks and papers☆37Updated last month
- A modular and extendable Python tool for emulating simple SMALI code.☆90Updated last year
- Real Android malware apps discussed in the book☆40Updated 2 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆180Updated last year
- ☆78Updated 4 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆37Updated 6 months ago
- Extracting unpacked dec files from running application using frida.☆39Updated 2 years ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆114Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆132Updated last year
- Decompress Xamarin .NET compressed binaries so they can be decompiled.☆48Updated 5 years ago
- Transparent Proxy via Frida hooks☆35Updated 2 years ago
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆28Updated last year
- Statically unpacking common android banker malware.☆158Updated 6 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Updated last year