alphaSeclab / android-security
Android Security Resources.
☆341Updated 4 years ago
Alternatives and similar repositories for android-security:
Users that are interested in android-security are comparing it to the libraries listed below
- ☆334Updated 5 months ago
- 安卓内核提权漏洞分析☆479Updated 5 years ago
- Mobile CTF Solutions☆211Updated 3 years ago
- This is a tool to help androidcoder to check the flaws in their projects.☆254Updated 10 months ago
- Android应用审计checklist整理☆287Updated 7 years ago
- This project contains pocs and exploits for vulneribilities I found (mostly)☆763Updated 10 months ago
- 体系化、实战化、step by step、目标清晰且具体的一个打怪升级、成长路径规划图☆418Updated last year
- Collections of my POCs for android vendor CVEs☆264Updated last year
- ☆73Updated 3 years ago
- Joint Advanced Defect assEsment for android applications☆348Updated 7 years ago
- My Github Stars☆105Updated 5 years ago
- Android application fuzzing framework with fuzzers and crash monitor.☆287Updated 4 years ago
- this unpack script for Android O and Android P☆303Updated 5 years ago
- FANS: Fuzzing Android Native System Services☆248Updated 4 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆135Updated 9 years ago
- Java runtime interop from Frida☆337Updated last month
- there are some CTF challenges or some other things helping improving android reversing skills.☆72Updated 5 years ago
- 利用 frida 获取 Jni RegisterNatives 动态注册的函数☆324Updated last year
- Frida scripts for mobile application dynamic-analysis.☆108Updated 10 months ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆573Updated 4 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆112Updated 2 years ago
- some useful adb commands for android reversing and debugging both 32 and 64 bit and support macOS and win10's MINGW64.☆319Updated 4 years ago
- Defeat Java packers via Frida instrumentation☆198Updated 2 years ago
- Runs frida-server on boot as root with magisk.☆213Updated last year
- ☆167Updated 3 years ago
- ☆102Updated last year
- Android 加固应用Hook方式-Frida☆276Updated 2 years ago
- Engine used by jnitrace to intercept JNI API calls.☆314Updated last year
- 汽车/安卓/固件/代码安全测试工具集☆606Updated 8 months ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆283Updated last year