U039b / AndroCFGLinks
Extract both control flow graphs and code parts from APK based on API calls.
☆19Updated 2 years ago
Alternatives and similar repositories for AndroCFG
Users that are interested in AndroCFG are comparing it to the libraries listed below
Sorting:
- Android application tracer powered by Frida☆78Updated 5 years ago
- ☆31Updated 2 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- Fuzzing framework to target native components of android applications☆20Updated 2 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- Library Profiles to work with LibScout☆23Updated 4 years ago
- A portable utility to locate android binder service☆95Updated 5 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 8 months ago
- Files used to resolve the r2pay challenge☆52Updated 4 years ago
- Miscellaneous code☆110Updated last month
- A bunch of JEB python scripts☆46Updated 4 years ago
- Tamper detection in Android☆90Updated 4 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆28Updated 3 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆117Updated 3 years ago
- DroidGuard VM Samples☆58Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆139Updated last year
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆40Updated 4 years ago
- ☆91Updated 2 years ago
- ☆32Updated 5 years ago
- This hosts the original version of the PScout Android permission mapping tool☆23Updated 7 years ago
- ☆120Updated 2 years ago
- you can use frida in jeb !☆46Updated 2 years ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆139Updated 9 years ago
- ☆73Updated 3 years ago
- This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 1…☆28Updated 4 years ago