U039b / AndroCFGLinks
Extract both control flow graphs and code parts from APK based on API calls.
☆19Updated 2 years ago
Alternatives and similar repositories for AndroCFG
Users that are interested in AndroCFG are comparing it to the libraries listed below
Sorting:
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- Fuzzing framework to target native components of android applications☆20Updated 3 years ago
- Files used to resolve the r2pay challenge☆54Updated 5 years ago
- ☆31Updated 2 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- Miscellaneous code☆109Updated 4 months ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆65Updated 5 years ago
- ☆124Updated 2 years ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- A bunch of JEB python scripts☆44Updated 4 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆30Updated 3 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated 2 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- Analysis of different techniques to bypass Network Security Config with Frida☆33Updated 4 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆117Updated 3 years ago
- Tamper detection in Android☆91Updated 4 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated last year
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆151Updated last year
- ☆31Updated last month
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆34Updated 2 years ago
- you can use frida in jeb !☆45Updated 3 years ago
- This hosts the original version of the PScout Android permission mapping tool☆23Updated 7 years ago
- Library Profiles to work with LibScout☆23Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆140Updated last year
- A portable utility to locate android binder service☆97Updated 6 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 3 years ago
- My own collection of Frida scripts and tricks☆68Updated 4 years ago