NoahS96 / Cloak-And-Dagger
An overlay attack example
☆26Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cloak-And-Dagger
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- Configurable, flexible regex-based APK modification tool.☆35Updated 7 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- This application attempts to detect android overlay attacks☆43Updated last year
- An Android port of radamsa fuzzer☆64Updated 4 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 5 years ago
- ☆24Updated 7 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆70Updated last year
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Android Library Code Recognition☆78Updated 6 months ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆97Updated 7 years ago
- CVE-2014-4322 Exploit☆22Updated 8 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- ☆39Updated 7 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- Xposed module for obtaining SQLCipher crypto keys☆37Updated 6 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- Utility to read custom structure from Tencent's libshell packer☆37Updated 5 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆40Updated 6 years ago
- Parse and tamper DEX file☆17Updated 7 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated last year
- Android application tracer powered by Frida☆78Updated 4 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆33Updated 9 years ago