commoncriteria / mobile-device
Protection Profile for Mobile Device Fundamentals
☆15Updated last week
Alternatives and similar repositories for mobile-device:
Users that are interested in mobile-device are comparing it to the libraries listed below
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated last year
- 1 button app to kill and start frida server for all the lazynation☆13Updated 6 years ago
- BGraph is a tool designed to generate dependencies graphs from Android.bp soong files.☆15Updated 2 years ago
- Vulnerability Reports by Aleph Research☆37Updated 10 months ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 4 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆43Updated 3 years ago
- ☆7Updated 8 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- temporary root for the Galaxy S7 Active☆21Updated 8 years ago
- Android Unpacking Automation using Corellium Devices☆131Updated 5 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- An overlay attack example☆26Updated 7 years ago
- A small subset of the submitted sample data from https://github.com/GrapheneOS/Auditor. It has a sample attestation certificate chain per…☆33Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated 9 months ago
- An Android port of the melkor ELF fuzzer☆60Updated 10 years ago
- InHouse safetynet killer☆29Updated 5 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆103Updated 9 years ago
- Bringing Mandatory Access Control to Android apps☆10Updated 3 years ago
- SEAndroid policy analysis tool☆12Updated 8 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Updated 4 months ago
- reversing mtk-su☆16Updated 4 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- Frida FDE bruteforce Samsung S7 Edge☆47Updated 5 years ago
- CVE-2013-6282 proof of concept for Android☆20Updated 8 years ago
- Qualcomm TrustZone kernel privilege escalation☆61Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago