OSUSecLab / InputScopeLinks
A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest.
☆46Updated 5 years ago
Alternatives and similar repositories for InputScope
Users that are interested in InputScope are comparing it to the libraries listed below
Sorting:
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆68Updated 6 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆92Updated 3 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated last year
- COVA - A static analysis tool to compute path conditions☆39Updated 5 months ago
- Benchmark apps for static analyzing native world of Android applications.☆13Updated 7 years ago
- ☆33Updated 3 weeks ago
- Time-travel Testing☆105Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆66Updated 4 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 9 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 6 years ago
- ☆25Updated 2 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆128Updated 2 years ago
- ☆42Updated 6 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆27Updated 7 years ago
- A portable utility to locate android binder service☆98Updated 6 years ago
- FANS: Fuzzing Android Native System Services☆262Updated 5 years ago
- ☆65Updated 4 years ago
- aurora-d☆20Updated 3 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆40Updated 2 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- IoT Security Papers☆48Updated 5 years ago
- System using the Analysis Query Language☆14Updated 3 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆70Updated 4 years ago