cryptax / angeapkLinks
Encrypting a PNG into an Android application
☆67Updated 6 years ago
Alternatives and similar repositories for angeapk
Users that are interested in angeapk are comparing it to the libraries listed below
Sorting:
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- Tool used for dumping memory from Android devices☆68Updated 10 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆194Updated 10 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆43Updated 2 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- apk binder script☆61Updated 11 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆89Updated 7 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 8 years ago
- Android Hacking Event 2017 Write-up☆46Updated 8 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆108Updated 10 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆85Updated 7 years ago
- Android APK Antivirus evasion for msfvenom generated payloads to inject into another APK file for phishing attacks.☆105Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆122Updated 4 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 6 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆22Updated 8 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- ☆54Updated 8 years ago
- AAMO: Another Android Malware Obfuscator☆124Updated 9 years ago
- Task Hijacking in Android (somebody call it also StrandHogg vulnerability)☆55Updated 5 years ago
- backHack, a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system conten…☆66Updated 5 years ago
- An overlay attack example☆29Updated 7 years ago
- Mobile security trainings based on android☆106Updated 4 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- A collection of scripts to speed up Android development☆33Updated 7 years ago
- ☆94Updated 7 years ago
- bash script to facilitate some aspects of an Android application assessment☆158Updated 4 years ago
- Collection of android malware samples☆54Updated 8 years ago