OSUSecLab / InputScope
A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest.
☆47Updated 4 years ago
Alternatives and similar repositories for InputScope:
Users that are interested in InputScope are comparing it to the libraries listed below
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 4 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆47Updated 3 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆36Updated 2 months ago
- COVA - A static analysis tool to compute path conditions☆32Updated 2 years ago
- ☆30Updated last year
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆65Updated 5 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆23Updated 6 years ago
- DiAne is a smart fuzzer for IoT devices☆40Updated 10 months ago
- Library Profiles to work with LibScout☆22Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆62Updated last year
- Benchmark apps for static analyzing native world of Android applications.☆12Updated 6 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 2 years ago
- ☆22Updated last year
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- This hosts the original version of the PScout Android permission mapping tool☆20Updated 6 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆28Updated 3 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆21Updated 2 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆121Updated last year
- Project FlowCog (2017)☆27Updated 6 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- ☆89Updated 2 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆21Updated 5 years ago
- Source-binary patch presence test system.☆82Updated 2 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆36Updated last year
- ☆72Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆47Updated 8 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Python bindings for Shimple/Jimple IR from Soot.☆42Updated last month