NoahS96 / Cloak-And-DaggerLinks
An overlay attack example
☆27Updated 7 years ago
Alternatives and similar repositories for Cloak-And-Dagger
Users that are interested in Cloak-And-Dagger are comparing it to the libraries listed below
Sorting:
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated 2 years ago
- ☆24Updated 7 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆38Updated 10 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆84Updated 7 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- Mobile security trainings based on android☆106Updated 4 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- mtkfb exploit for mt658x & mt6592☆35Updated 9 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆15Updated 10 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- LD_PRELOAD magic for Android's AssetManager☆79Updated 3 years ago
- ☆33Updated 9 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- Android File Fuzzing Framework☆86Updated 3 years ago