OSUSecLab / InputScopeLinks
A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest.
☆47Updated 5 years ago
Alternatives and similar repositories for InputScope
Users that are interested in InputScope are comparing it to the libraries listed below
Sorting:
- COVA - A static analysis tool to compute path conditions☆36Updated this week
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 3 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 4 years ago
- Benchmark apps for static analyzing native world of Android applications.☆13Updated 6 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆66Updated 6 years ago
- ☆24Updated last year
- Library Profiles to work with LibScout☆22Updated 4 years ago
- ☆31Updated 2 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆25Updated 6 years ago
- DiAne is a smart fuzzer for IoT devices☆40Updated last year
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 7 months ago
- ReDeBug Source Code.☆24Updated last year
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- A Static Code Feature Extraction Tool for Java and Android☆20Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- A targeted input generator for Android that improves the effectiveness of dynamic malware analysis.☆59Updated 7 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆77Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- BigMAC: Analysis tool to introspect and query Android security policies.☆38Updated last year
- 使用Soot进行android应用静态分析☆67Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆42Updated 6 years ago
- Symbolic Execution of Android Framework☆15Updated 8 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆65Updated 3 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago