botherder / snoopdroid
(Abandoned) Extract packages from an Android device
☆51Updated 3 years ago
Alternatives and similar repositories for snoopdroid:
Users that are interested in snoopdroid are comparing it to the libraries listed below
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- Tool used for dumping memory from Android devices☆68Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆103Updated 9 years ago
- Android Data Extractor Lite☆128Updated 9 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆45Updated 8 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- Android Connections Forensics☆33Updated 9 years ago
- ADB Based Acquisition Tool for Android Forensics☆40Updated 3 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- ☆93Updated 6 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- Test Android Application.☆19Updated 9 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- The iOS Agent for the Needle Security Assessment Framework☆42Updated 7 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆26Updated 5 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆29Updated 11 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- Tools and scripts dedicated to Android application security☆48Updated 4 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- repo with compromised keys and such☆20Updated 2 years ago
- ☆26Updated 4 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago