U039b / AndroCFG
Extract both control flow graphs and code parts from APK based on API calls.
☆18Updated last year
Alternatives and similar repositories for AndroCFG:
Users that are interested in AndroCFG are comparing it to the libraries listed below
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- ☆30Updated last year
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- This hosts the original version of the PScout Android permission mapping tool☆20Updated 6 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆36Updated 2 months ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 2 years ago
- Python API Monitor for Android apps☆54Updated 7 months ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆47Updated 4 years ago
- ☆89Updated 2 years ago
- Detection Rules for Quark Engine. Please use the website below to explore our rules.☆29Updated 2 years ago
- Files used to resolve the r2pay challenge☆49Updated 4 years ago
- Fuzzing framework to target native components of android applications☆19Updated 2 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆47Updated 3 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- ☆73Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- Android Malware Tracker☆27Updated 10 months ago
- Library Profiles to work with LibScout☆22Updated 3 years ago
- A bunch of JEB python scripts☆46Updated 3 years ago
- The Frida based fuzzer all in one☆30Updated 3 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- ☆27Updated last year
- Miscellaneous code☆102Updated last month
- Android application tracer powered by Frida☆78Updated 4 years ago