fkie-cad / DeStroidLinks
Fighting String Encryption in Android Malware
☆59Updated 3 years ago
Alternatives and similar repositories for DeStroid
Users that are interested in DeStroid are comparing it to the libraries listed below
Sorting:
- Android Malware Tracker☆28Updated last year
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- Android malware threats that spread in 2018☆45Updated 6 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- A smali emulator.☆25Updated 6 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- cve-2019-11931☆35Updated 5 years ago
- ☆45Updated 8 years ago
- ☆18Updated 6 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆40Updated 4 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- Official Dexcalibur documentation☆16Updated 4 years ago
- Malware detection using learning and information retrieval for Android☆73Updated 4 years ago
- IDA, Ghidra and Radare2 scripts. Also Android scripts to make your life easier.☆48Updated 5 years ago
- ☆31Updated 2 months ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineering☆21Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆53Updated 5 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- Repository with research related to Android☆13Updated 6 years ago
- ☆32Updated 5 years ago
- Mobile security trainings based on android☆106Updated 4 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 10 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago