CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against emulator evasion. For more information and installation manual, please refer to CamoDroid's Wiki on GitHub.
☆33Jan 3, 2022Updated 4 years ago
Alternatives and similar repositories for CamoDroid
Users that are interested in CamoDroid are comparing it to the libraries listed below
Sorting:
- 基于安卓QQ 8.4.1.4680 椭圆曲线算法 (ECDH) 的 C# 实现☆12Aug 6, 2020Updated 5 years ago
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- ☆13Jan 22, 2025Updated last year
- The WhatsApp lib for java☆15Mar 1, 2021Updated 5 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- by using Android x86 Emulator☆51Apr 28, 2019Updated 6 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- 使用 frida stalker 实现的 trace☆30Dec 1, 2022Updated 3 years ago
- ☆13Sep 21, 2025Updated 5 months ago
- 使用Soot进行android应用静态分析☆68Jul 8, 2018Updated 7 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- KronoDroid Dataset☆36Nov 7, 2025Updated 4 months ago
- ☆82Sep 3, 2021Updated 4 years ago
- Python API Monitor for Android apps☆87Jul 4, 2024Updated last year
- ☆81Oct 12, 2021Updated 4 years ago
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 4 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆10Dec 29, 2023Updated 2 years ago
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- ☆162Jan 12, 2020Updated 6 years ago
- Elliptic curve algorithm wrappers☆14Oct 17, 2024Updated last year
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Nov 30, 2025Updated 3 months ago
- A small tool to patch PE files' import address table with an external payload DLL.☆16Feb 15, 2026Updated 3 weeks ago
- ☆12Mar 15, 2020Updated 5 years ago
- 👀 All-Seeing Eye: Arbitrary File Read Vulnerability in Chrome Versions Prior to 116☆10Nov 18, 2023Updated 2 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- 在线安软识别☆12Aug 6, 2025Updated 7 months ago
- ☆11Jul 20, 2024Updated last year
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- ☆15Sep 2, 2024Updated last year
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago