OSUSecLab / InputScope
A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest.
☆47Updated 4 years ago
Alternatives and similar repositories for InputScope:
Users that are interested in InputScope are comparing it to the libraries listed below
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆47Updated 3 years ago
- COVA - A static analysis tool to compute path conditions☆32Updated 2 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 4 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- DiAne is a smart fuzzer for IoT devices☆40Updated 9 months ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆60Updated last year
- ☆30Updated last year
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 2 years ago
- ☆87Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆35Updated last month
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆63Updated 5 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆23Updated 6 years ago
- ☆22Updated last year
- A dynamic analysis platform for Android☆42Updated 5 years ago
- Benchmark apps for static analyzing native world of Android applications.☆12Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 8 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆28Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆120Updated last year
- Library Profiles to work with LibScout☆22Updated 3 years ago
- This hosts the original version of the PScout Android permission mapping tool☆20Updated 6 years ago
- Source-binary patch presence test system.☆82Updated 2 years ago
- Symbolic Execution of Android Framework☆15Updated 7 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆64Updated 3 years ago
- ☆31Updated 4 years ago
- ☆71Updated 3 years ago
- AFLNW: network wrapper for AFL☆47Updated 10 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 8 months ago
- Python bindings for Shimple/Jimple IR from Soot.☆42Updated last week
- Static Analysis Framework for Android Hybrid Applications☆24Updated 4 years ago