geeksonsecurity / android-overlay-malware-example
Harmless Android malware using the overlay technique to steal user credentials.
☆88Updated 7 years ago
Alternatives and similar repositories for android-overlay-malware-example:
Users that are interested in android-overlay-malware-example are comparing it to the libraries listed below
- This application attempts to detect android overlay attacks☆44Updated last year
- AAMO: Another Android Malware Obfuscator☆124Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆103Updated 9 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆190Updated 9 years ago
- Runtime memory analysis framework to identify Android malware☆145Updated 6 years ago
- Mobile security trainings based on android☆104Updated 4 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 8 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- bash script to facilitate some aspects of an Android application assessment☆157Updated 3 years ago
- Tool used for dumping memory from Android devices☆68Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Updated 8 years ago
- An overlay attack example☆26Updated 7 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated last year
- Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header☆71Updated 12 years ago
- Check Android device security settings☆85Updated 5 years ago
- Android Hacking Event 2017 Write-up☆44Updated 7 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago
- PoC framework for APK obfuscation☆53Updated 9 years ago
- Dalvik Monitoring Framework for CuckooDroid☆91Updated 8 years ago
- Exploit for Android Zip bugs: 8219321, 9695860, and 9950697☆144Updated 10 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆121Updated 6 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆209Updated 10 years ago
- Collection of Android security related resources☆99Updated last year
- Android ADB backup APK Injection POC☆139Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Look for interesting things in an APK and inject logging☆47Updated 11 years ago
- Android app analysis and feature extraction library☆222Updated 4 years ago
- Popular Android threats in 2019☆250Updated 5 years ago