Overview of tools to de-identify, synthesize and work safely with (sensitive) data
☆24Nov 28, 2024Updated last year
Alternatives and similar repositories for privacy-engineering-tools
Users that are interested in privacy-engineering-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 10 months ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- Rerousces related to time-travel debugging (TTD)☆33Jan 6, 2026Updated 2 months ago
- ☆12Dec 22, 2025Updated 3 months ago
- ☆10Sep 25, 2024Updated last year
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆42Jan 31, 2026Updated last month
- ☆19Sep 7, 2025Updated 6 months ago
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆37Oct 6, 2025Updated 5 months ago
- XSS that opens Blobbypass. It can be useful for webview bypasses.☆12Jun 5, 2025Updated 9 months ago
- ☆15Apr 3, 2022Updated 3 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆21Sep 16, 2023Updated 2 years ago
- ☆11Mar 5, 2023Updated 3 years ago
- Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security☆29Dec 25, 2025Updated 2 months ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12May 14, 2024Updated last year
- Known vulnerability scanning for your GitHub repository using CVE Binary Tool. This Action can scan binaries, component lists and SBOMs …☆15Oct 20, 2025Updated 5 months ago
- Coverage gathering JVMTI agent for Android☆26Oct 11, 2023Updated 2 years ago
- A string deobfuscator for Android applications using backwards program slicing☆15Aug 10, 2019Updated 6 years ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Jul 22, 2024Updated last year
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆225Mar 13, 2026Updated last week
- Demand-Driven Pointer Analysis☆15Mar 9, 2026Updated 2 weeks ago
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆13Dec 5, 2024Updated last year
- Collections of Quark Script that detect vulnerabilities in the binaries.☆21Aug 31, 2025Updated 6 months ago
- CVE-2024-57727☆14Jan 17, 2025Updated last year
- Open source of the paper "击败SOTA反混淆方法"☆18Sep 10, 2022Updated 3 years ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- 安卓逆向利器:JEB☆21Oct 7, 2024Updated last year
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- 渗透测试、攻防姿势笔记☆20Jun 13, 2025Updated 9 months ago
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆18Sep 1, 2025Updated 6 months ago
- 🔥🔥🔥🚀Windows平台版本的apk、ipa、so、aar、jar等库代码扫描工具☆18Aug 14, 2023Updated 2 years ago
- MIT IEEE URTC 2024. GSET 2024. Repository for the "MBASED: Practical Simplifications of Mixed Boolean-Arithmetic Obfuscation". A Binary N…☆40Aug 8, 2025Updated 7 months ago
- ☆13May 17, 2025Updated 10 months ago
- fork of esprima, with full ES2022 support☆21Mar 13, 2024Updated 2 years ago
- ☆33Sep 13, 2024Updated last year
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year