U039b / AndroCFGLinks
Extract both control flow graphs and code parts from APK based on API calls.
☆19Updated 2 years ago
Alternatives and similar repositories for AndroCFG
Users that are interested in AndroCFG are comparing it to the libraries listed below
Sorting:
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- ☆31Updated 2 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- This hosts the original version of the PScout Android permission mapping tool☆22Updated 6 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- Fuzzing framework to target native components of android applications☆20Updated 2 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆67Updated 4 years ago
- ☆73Updated 3 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 3 years ago
- Library Profiles to work with LibScout☆22Updated 4 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated last year
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- ☆29Updated last year
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- ☆90Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 6 months ago
- A smali emulator.☆25Updated 6 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 3 years ago
- Symbolic Execution of Android Framework☆15Updated 7 years ago
- ☆32Updated 5 years ago
- Implementation of CCS'2022 paper "Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps"☆24Updated last year
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- use frida monitoring android app☆49Updated 6 years ago
- A bunch of JEB python scripts☆46Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago