U039b / AndroCFGLinks
Extract both control flow graphs and code parts from APK based on API calls.
☆19Updated 2 years ago
Alternatives and similar repositories for AndroCFG
Users that are interested in AndroCFG are comparing it to the libraries listed below
Sorting:
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆31Updated 3 years ago
- Files used to resolve the r2pay challenge☆53Updated 4 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- ☆31Updated 2 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- Tamper detection in Android☆88Updated 4 years ago
- Miscellaneous code☆111Updated 2 months ago
- Fuzzing framework to target native components of android applications☆20Updated 2 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆29Updated 3 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 4 years ago
- Analysis of different techniques to bypass Network Security Config with Frida☆33Updated 4 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- Automated Frida hook generation with JEB☆151Updated 2 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- Android library for detecting Android virtual containers.☆70Updated 4 years ago
- ☆74Updated 3 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated 2 years ago
- ☆18Updated 5 years ago
- PoC Frida script to view Android libbinder traffic☆139Updated last year
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆44Updated last year
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- you can use frida in jeb !☆46Updated 2 years ago
- ☆31Updated last year
- ☆30Updated 3 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- ☆32Updated 5 years ago
- ☆24Updated last year
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆40Updated 4 years ago