commoncriteria / mobile-deviceLinks
Protection Profile for Mobile Device Fundamentals
☆15Updated this week
Alternatives and similar repositories for mobile-device
Users that are interested in mobile-device are comparing it to the libraries listed below
Sorting:
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 10 years ago
- Bringing Mandatory Access Control to Android apps☆11Updated 4 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆29Updated 11 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Updated last year
- This application attempts to detect android overlay attacks☆45Updated 2 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆104Updated 8 years ago
- BGraph is a tool designed to generate dependencies graphs from Android.bp soong files.☆19Updated 3 months ago
- Dump Android Verified Boot Signature☆65Updated 6 years ago
- ☆40Updated 4 years ago
- An app intended for fuzzing the Android Binder interface and System Services☆114Updated 5 years ago
- Android Unpacking Automation using Corellium Devices☆137Updated last month
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆28Updated 7 months ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 4 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆47Updated 4 years ago
- Android library for detecting Android virtual containers.☆71Updated 5 years ago
- An Android application, designed as a reference point, that implements an array of tamper and root detection methods - inspired by Google…☆15Updated 5 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Updated 7 years ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆81Updated 3 years ago
- DroidGuard VM Samples☆67Updated 3 years ago
- A part of the project to detect Magisk on an Android device☆11Updated 6 years ago
- A dynamic analysis platform for Android☆44Updated 6 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆137Updated 4 years ago
- ARTist's deployment application, for code-injection on an Android device.☆39Updated 6 years ago
- Shim to grab keystore backed data☆27Updated 8 years ago
- Utility to read custom structure from Tencent's libshell packer☆39Updated 7 years ago
- Extracting the strings from the .dex files with meaning.☆12Updated 8 years ago
- CVE-2013-6282 proof of concept for Android☆21Updated 9 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 6 years ago