Madiba-Research / ThirdEyeLinks
Implementation of CCS'2022 paper "Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps"
☆24Updated last year
Alternatives and similar repositories for ThirdEye
Users that are interested in ThirdEye are comparing it to the libraries listed below
Sorting:
- Hardware Assisted Unpacking of Android Apps☆56Updated 4 years ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12Updated last year
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 11 months ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆152Updated last year
- ☆15Updated 4 years ago
- Coverage gathering JVMTI agent for Android☆22Updated 2 years ago
- blabla☆49Updated 5 years ago
- PoC of CVE-2022-20474☆19Updated 9 months ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆30Updated 3 years ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆96Updated last year
- Open/HarmonyOS abc file parser and decompiler☆115Updated 2 months ago
- Adaptive Unpacking Android Packed Applications☆38Updated 3 years ago
- ☆147Updated 2 months ago
- ☆61Updated last year
- 010Editor template for .abc (Open/HarmonyOS Ark Bytecode) files☆41Updated last year
- PendingIntent exploit☆11Updated 2 years ago
- Framework for investigating VM-based Android packers☆36Updated 3 years ago
- ☆84Updated 4 years ago
- Android Root Zap Framework, Lazy and Powerful :)☆53Updated 3 months ago
- CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against em…☆33Updated 3 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆42Updated last year
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆192Updated last year
- IDA plugin, unwind stack trace when debugging arm.☆139Updated 5 years ago
- Android eBPF sample☆50Updated 3 years ago
- Something To Do Android Application Security Research☆10Updated 4 years ago
- Code Scanner For Android Privacy☆38Updated 2 years ago
- 使用Soot进行android应用静态分析☆67Updated 7 years ago
- You can run Android Runtime in Qiling☆29Updated 3 years ago
- Extract call graph from apks using Flowdroid.☆20Updated 5 years ago