Madiba-Research / ThirdEye
Implementation of CCS'2022 paper "Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps"
☆23Updated 11 months ago
Alternatives and similar repositories for ThirdEye:
Users that are interested in ThirdEye are comparing it to the libraries listed below
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 4 months ago
- Something To Do Android Application Security Research☆10Updated 3 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 3 years ago
- PendingIntent exploit☆11Updated last year
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 3 years ago
- ☆39Updated last week
- blabla☆49Updated 4 years ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆88Updated last year
- Open/HarmonyOS abc file parser and decompiler☆81Updated 6 months ago
- You can run Android Runtime in Qiling☆26Updated 2 years ago
- Hardware Assisted Unpacking of Android Apps☆56Updated 3 years ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 3 years ago
- ☆58Updated 9 months ago
- Code Scanner For Android Privacy☆38Updated 2 years ago
- BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more☆21Updated 2 years ago
- Container and system event tracing using eBPF☆33Updated 2 months ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12Updated 11 months ago
- PoC of CVE-2022-20474☆13Updated 2 months ago
- 010Editor template for .abc (Open/HarmonyOS Ark Bytecode) files☆41Updated 6 months ago
- Extract call graph from apks using Flowdroid.☆19Updated 4 years ago
- CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against em…☆30Updated 3 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆89Updated 9 months ago
- Run `strace` on program that is under another debugger☆17Updated last year
- Library Profiles to work with LibScout☆22Updated 3 years ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- CVE-2024-0044☆10Updated 7 months ago
- Android Overlay Hijack☆23Updated 7 months ago