WithSecureLabs / weasel
☆19Updated 11 years ago
Alternatives and similar repositories for weasel:
Users that are interested in weasel are comparing it to the libraries listed below
- An Android port of radamsa fuzzer☆65Updated 5 years ago
- An Android port of the general purpose honggfuzz fuzzer☆18Updated 9 years ago
- ☆23Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- ☆16Updated 9 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Updated 10 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- ☆33Updated 9 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 9 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 8 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- Android anti-root detection Proof of Concept☆43Updated 9 years ago
- ☆27Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- slide and full exploit☆86Updated 4 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- cve-2014-4323 poc☆24Updated 9 years ago