NoahS96 / Cloak-And-Dagger
An overlay attack example
☆26Updated 7 years ago
Alternatives and similar repositories for Cloak-And-Dagger:
Users that are interested in Cloak-And-Dagger are comparing it to the libraries listed below
- An Android port of the melkor ELF fuzzer☆60Updated 10 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- Android Library Code Recognition☆79Updated 9 months ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Configurable, flexible regex-based APK modification tool.☆36Updated 7 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- JNI Helper Plugin☆52Updated 2 months ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆38Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- This application attempts to detect android overlay attacks☆43Updated last year
- ☆39Updated 7 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated last year
- Dalvik Monitoring Framework for CuckooDroid☆91Updated 8 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated last year
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- ☆24Updated 7 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- Android Security☆29Updated 10 years ago
- Parse and tamper DEX file☆18Updated 8 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆33Updated 9 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Mobile security trainings based on android☆104Updated 4 years ago
- ☆34Updated 8 years ago
- PoC code for CVE-2017-13253☆39Updated 4 years ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago