geeksonsecurity / android-overlay-malware-example
Harmless Android malware using the overlay technique to steal user credentials.
☆88Updated 7 years ago
Alternatives and similar repositories for android-overlay-malware-example
Users that are interested in android-overlay-malware-example are comparing it to the libraries listed below
Sorting:
- This application attempts to detect android overlay attacks☆44Updated last year
- Runtime memory analysis framework to identify Android malware☆145Updated 7 years ago
- AAMO: Another Android Malware Obfuscator☆124Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆109Updated 10 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆79Updated 8 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆191Updated 9 years ago
- Tool used for dumping memory from Android devices☆68Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Updated 8 years ago
- Android stuff☆28Updated 10 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆123Updated 6 years ago
- Collection of Android security related resources☆101Updated last year
- Mobile security trainings based on android☆105Updated 4 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- Exploit for Android Zip bugs: 8219321, 9695860, and 9950697☆144Updated 10 years ago
- Initial Collection of HackingTeam Exploits☆92Updated 9 years ago
- Android ADB backup APK Injection POC☆139Updated 9 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆84Updated 7 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Advanced detection of rooting☆74Updated 9 years ago
- bash script to facilitate some aspects of an Android application assessment☆157Updated 3 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆54Updated 8 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated 2 years ago
- Look for interesting things in an APK and inject logging☆47Updated 12 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Android File Fuzzing Framework☆86Updated 2 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- An overlay attack example☆26Updated 7 years ago
- A collection of scripts to speed up Android development☆33Updated 7 years ago
- Dalvik Monitoring Framework for CuckooDroid☆92Updated 8 years ago
- Android app analysis and feature extraction library☆223Updated 4 years ago