OSUSecLab / InputScopeLinks
A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest.
☆46Updated 5 years ago
Alternatives and similar repositories for InputScope
Users that are interested in InputScope are comparing it to the libraries listed below
Sorting:
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆68Updated 6 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆90Updated 3 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- Time-travel Testing☆104Updated 3 years ago
- Benchmark apps for static analyzing native world of Android applications.☆13Updated 7 years ago
- COVA - A static analysis tool to compute path conditions☆39Updated 4 months ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆27Updated 7 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 11 months ago
- ☆31Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- Static Analysis Framework for Android Hybrid Applications☆25Updated 5 years ago
- ☆42Updated 6 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆51Updated 5 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 6 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆126Updated 2 years ago
- FANS: Fuzzing Android Native System Services☆261Updated 5 years ago
- ☆25Updated 2 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- System using the Analysis Query Language☆14Updated 3 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆66Updated 3 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- A portable utility to locate android binder service☆97Updated 6 years ago
- Python bindings for Shimple/Jimple IR from Soot.☆42Updated 4 months ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆40Updated 2 years ago
- The tools used to train the models used for the ICISC paper "Recurrent neural networks for fuzz testing web browsers"☆28Updated 6 years ago