NoahS96 / Cloak-And-DaggerLinks
An overlay attack example
☆29Updated 8 years ago
Alternatives and similar repositories for Cloak-And-Dagger
Users that are interested in Cloak-And-Dagger are comparing it to the libraries listed below
Sorting:
- Mobile security trainings based on android☆107Updated 5 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆74Updated 2 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆85Updated 7 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- ☆175Updated 4 years ago
- Advanced detection of rooting☆74Updated 10 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Updated 2 years ago
- An Android port of the melkor ELF fuzzer☆62Updated 11 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆29Updated 10 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- An Android port of radamsa fuzzer☆67Updated 5 years ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆39Updated 10 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago
- Configurable, flexible regex-based APK modification tool.☆37Updated 8 years ago
- Runtime memory analysis framework to identify Android malware☆147Updated 7 years ago
- Shim to grab keystore backed data☆27Updated 8 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 9 years ago
- This application attempts to detect android overlay attacks☆45Updated 2 years ago
- Check Android device security settings☆87Updated 6 years ago
- PoC framework for APK obfuscation☆52Updated 10 years ago
- A portable utility to locate android binder service☆97Updated 6 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Android Hacking Event 2017 Write-up☆45Updated 8 years ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆81Updated 3 years ago
- AAMO: Another Android Malware Obfuscator☆124Updated 10 years ago
- Android Library Code Recognition☆83Updated last year
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 8 years ago
- Tamper detection in Android☆92Updated 4 years ago