aress31 / sci
Framework designed to automate the process of assembly code injection (trojanising) within Android applications.
☆37Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for sci
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆19Updated 4 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆14Updated 9 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 5 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Encrypting a PNG into an Android application☆68Updated 5 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- Test Android Application.☆19Updated 8 years ago
- ☆54Updated 7 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆19Updated 6 years ago
- Tool used for dumping memory from Android devices☆66Updated 9 years ago
- pentest toolbox☆28Updated 2 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆30Updated 10 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆10Updated 2 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 3 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- ⛔ 🛡️WeDefend- Monitor and Protect Android from Remote Access Trojan☆26Updated 4 years ago
- repo with compromised keys and such☆20Updated last year
- Frida FDE bruteforce Samsung S7 Edge☆47Updated 5 years ago
- iOS malware samples☆36Updated 8 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- ☆13Updated 3 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆26Updated 5 years ago
- Vulnerability Scanner☆12Updated 9 years ago