U039b / AndroCFG
Extract both control flow graphs and code parts from APK based on API calls.
☆18Updated last year
Alternatives and similar repositories for AndroCFG:
Users that are interested in AndroCFG are comparing it to the libraries listed below
- This hosts the original version of the PScout Android permission mapping tool☆20Updated 6 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆36Updated 3 months ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- Library Profiles to work with LibScout☆22Updated 3 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆47Updated 3 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- ☆30Updated last year
- Files used to resolve the r2pay challenge☆50Updated 4 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- ☆73Updated 3 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- System using the Analysis Query Language☆14Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆62Updated last year
- Python API Monitor for Android apps☆55Updated 8 months ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 2 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 4 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆28Updated 3 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Implementation of CCS'2022 paper "Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps"☆23Updated 10 months ago
- The Frida based fuzzer all in one☆30Updated 3 years ago
- ☆115Updated last year
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆47Updated 4 years ago
- Java-layer Android Malware Simplifier☆28Updated 3 years ago
- PScout Android permission mappings☆25Updated 2 years ago
- you can use frida in jeb !☆46Updated 2 years ago
- ☆23Updated last year
- Benchmark apps for static analyzing native world of Android applications.☆12Updated 6 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago