U039b / AndroCFGLinks
Extract both control flow graphs and code parts from APK based on API calls.
☆19Updated 2 years ago
Alternatives and similar repositories for AndroCFG
Users that are interested in AndroCFG are comparing it to the libraries listed below
Sorting:
- Library Profiles to work with LibScout☆22Updated 4 years ago
- ☆31Updated 2 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- ☆30Updated last year
- Fuzzing framework to target native components of android applications☆20Updated 2 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆28Updated 3 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- ☆90Updated 2 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 7 months ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- Files used to resolve the r2pay challenge☆52Updated 4 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 3 years ago
- ☆73Updated 3 years ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- A smali emulator.☆25Updated 7 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 3 years ago
- ☆18Updated 5 years ago
- JNI Helper Plugin☆53Updated 6 months ago
- Android Malware Tracker☆28Updated last year
- ☆14Updated 3 years ago
- ☆32Updated 5 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago