NoahS96 / Cloak-And-Dagger
An overlay attack example
☆25Updated 6 years ago
Related projects: ⓘ
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 6 years ago
- Shim to grab keystore backed data☆27Updated 6 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- ☆24Updated 6 years ago
- This application attempts to detect android overlay attacks☆43Updated last year
- An Android port of radamsa fuzzer☆64Updated 4 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆71Updated last year
- Android application tracer powered by Frida☆78Updated 4 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆93Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- SafetyNet Jar download & extractor utility☆35Updated 6 years ago
- Configurable, flexible regex-based APK modification tool.☆35Updated 7 years ago
- Tamper detection in Android☆85Updated 3 years ago
- android apk查壳工具源代码☆17Updated 9 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆28Updated last year
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆129Updated 8 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆21Updated last year
- Android OAT Plugin for JEB☆46Updated last year
- Android Library Code Recognition☆77Updated 4 months ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- zygotebench - benchmark process creation speed on Android☆13Updated 10 years ago
- Bypass signature and permission checks for IPCs☆82Updated 10 years ago
- ☆39Updated this week
- ARTist's deployment application, for code-injection on an Android device.☆37Updated 5 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- mtkfb exploit for mt658x & mt6592☆32Updated 9 years ago