LaurieWired / StrangeLoopLinks
This contains notes, slides, and code for my Strange Loop talk
☆32Updated last year
Alternatives and similar repositories for StrangeLoop
Users that are interested in StrangeLoop are comparing it to the libraries listed below
Sorting:
- Smali reference for reverse engineering Dalvik Bytecode☆38Updated last year
- This contains notes, slides, and code for my Infosec World talk☆20Updated last year
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13Updated 2 years ago
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆30Updated 11 months ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆38Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆27Updated last year
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆55Updated last year
- ☆21Updated last year
- This contains notes and slides for my Objective by the Sea talk☆99Updated last year
- .wav files of various oscilliscope graphics tests☆17Updated last year
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆15Updated 2 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆41Updated 11 months ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆100Updated 2 years ago
- Docker container for quickly analyzing Linux malware☆77Updated last year
- Turn binaries into music☆50Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- ☆35Updated last year
- Real Android malware apps discussed in the book☆37Updated last year
- Slides and videos from my public speeches / conferences☆75Updated 3 weeks ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆107Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Updated 11 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆33Updated 2 months ago
- A list of bizarre crackmes☆118Updated 2 weeks ago
- ☆25Updated 2 years ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆17Updated 6 months ago
- Supporting code and apps for demonstrating Android interprocess communication☆41Updated 10 months ago
- APK downloader from few sources☆133Updated 2 months ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆39Updated 10 months ago
- Collection of my Security Blueprints & Guides☆50Updated 3 weeks ago