ahlashkari / AndroidAppLyzer
Static and Dynamic Android App analyzer
☆20Updated 2 years ago
Alternatives and similar repositories for AndroidAppLyzer:
Users that are interested in AndroidAppLyzer are comparing it to the libraries listed below
- Python API Monitor for Android apps☆53Updated 6 months ago
- CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against em…☆29Updated 3 years ago
- Extract both control flow graphs and code parts from APK based on API calls.☆18Updated last year
- Android third-party library Detection☆16Updated 4 years ago
- Dynamic Analysis Tool of the Android Application Framework☆22Updated last year
- Hardware Assisted Unpacking of Android Apps☆54Updated 3 years ago
- A repository of Android common libraries and advertisement libraries☆31Updated 6 years ago
- ☆44Updated 4 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆84Updated 6 months ago
- Toy tool meant to extract translated descriptions of permissions and groups from AOSP☆13Updated 2 years ago
- Extract call graph from apks using Flowdroid.☆20Updated 4 years ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12Updated 8 months ago
- ACVTool (Android Code Coverage Tool) is a tool to measure fine-grained code coverage of 3rd-party Android apps.☆112Updated 2 weeks ago
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆10Updated last month
- Files used to resolve the r2pay challenge☆48Updated 4 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆47Updated 3 years ago
- REAPER: Real-time App Analysis for Augmenting the Android Permission System☆17Updated 5 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 2 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆24Updated 2 years ago
- Python library for parsing and unparsing smali files for programatic modification☆19Updated 3 years ago
- Library Profiles to work with LibScout☆22Updated 3 years ago
- Adaptive Unpacking Android Packed Applications☆36Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 2 years ago
- Implementation of CCS'2022 paper "Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps"☆21Updated 8 months ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆44Updated last year
- Generic Frida Script To Bypass Root Detection☆54Updated 2 years ago
- ☆73Updated 3 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆110Updated 2 years ago
- Project FlowCog (2017)☆27Updated 6 years ago