geeksonsecurity / android-overlay-malware-example
Harmless Android malware using the overlay technique to steal user credentials.
☆86Updated 6 years ago
Related projects: ⓘ
- This application attempts to detect android overlay attacks☆43Updated last year
- Runtime memory analysis framework to identify Android malware☆142Updated 6 years ago
- AAMO: Another Android Malware Obfuscator☆121Updated 8 years ago
- ☆30Updated this week
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 7 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆100Updated 9 years ago
- ☆138Updated this week
- Android Framework for Exploitation, is a framework for exploiting android based devices☆184Updated 8 years ago
- ☆40Updated this week
- Android stuff☆28Updated 9 years ago
- Mobile security trainings based on android☆102Updated 3 years ago
- Contains many different ways to identify hostile environments.☆63Updated 8 years ago
- Advanced detection of rooting☆70Updated 8 years ago
- Check Android device security settings☆81Updated 4 years ago
- ☆88Updated 6 years ago
- bash script to facilitate some aspects of an Android application assessment☆155Updated 3 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆93Updated 7 years ago
- Dalvik Monitoring Framework for CuckooDroid☆91Updated 8 years ago
- ARES: Android Reverse Engineering Suite is a security suite for analyzing Android .apk files.☆31Updated 7 years ago
- Collection of Android security related resources☆94Updated 8 months ago
- Initial Collection of HackingTeam Exploits☆91Updated 9 years ago
- Encrypting a PNG into an Android application☆68Updated 5 years ago
- Collection of android malware samples☆52Updated 7 years ago
- Tool used for dumping memory from Android devices☆65Updated 9 years ago
- ☆55Updated 7 years ago
- Android ADB backup APK Injection POC☆138Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆123Updated 8 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆81Updated 6 years ago
- ☆166Updated 3 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Updated 7 years ago