OSUSecLab / InputScope
A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest.
☆47Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for InputScope
- COVA - A static analysis tool to compute path conditions☆32Updated 2 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆41Updated 4 years ago
- ☆84Updated 2 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆47Updated 3 years ago
- ☆22Updated last year
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆35Updated last year
- Benchmark apps for static analyzing native world of Android applications.☆12Updated 6 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆23Updated 6 years ago
- ☆30Updated last year
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆63Updated 5 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆59Updated last year
- A dynamic analysis platform for Android☆42Updated 5 years ago
- This hosts the original version of the PScout Android permission mapping tool☆20Updated 6 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆39Updated 7 months ago
- Python bindings for Shimple/Jimple IR from Soot.☆42Updated 10 months ago
- Library Profiles to work with LibScout☆22Updated 3 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Bring libfuzzer to Unicorn☆26Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆27Updated 2 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆64Updated 2 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆119Updated last year
- aurora-d☆20Updated 2 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 7 years ago
- Symbolic Execution of Android Framework☆14Updated 7 years ago
- ☆31Updated 4 years ago
- ☆42Updated 5 years ago
- ☆13Updated 2 years ago
- The Frida based fuzzer all in one☆30Updated 3 years ago