aress31 / sci
Framework designed to automate the process of assembly code injection (trojanising) within Android applications.
☆40Updated 2 years ago
Alternatives and similar repositories for sci:
Users that are interested in sci are comparing it to the libraries listed below
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- Encrypting a PNG into an Android application☆67Updated 5 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆19Updated 6 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆15Updated 9 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- Test Android Application.☆19Updated 8 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆30Updated 11 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- ⛔ 🛡️WeDefend- Monitor and Protect Android from Remote Access Trojan☆26Updated 4 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- InsideVuln [Inside Vulnerabilities] : Python script to detect vulnerabilities into a PHP source code using statical analysis, based on re…☆9Updated 6 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- Tool used for dumping memory from Android devices☆66Updated 9 years ago
- Unified repository for different Metasploit Framework payloads☆14Updated 7 years ago
- AnDroidInject0r is a Python script to inject existing Android applications with a Meterpreter payload. It can be used during penetrating …☆16Updated 3 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- ☆55Updated 7 years ago
- repo with compromised keys and such☆20Updated 2 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆12Updated 6 years ago
- A minimalistic android backdoor☆15Updated 4 years ago
- pentest toolbox☆28Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago