geeksonsecurity / android-overlay-malware-exampleLinks
Harmless Android malware using the overlay technique to steal user credentials.
☆90Updated 7 years ago
Alternatives and similar repositories for android-overlay-malware-example
Users that are interested in android-overlay-malware-example are comparing it to the libraries listed below
Sorting:
- AAMO: Another Android Malware Obfuscator☆124Updated 9 years ago
- Runtime memory analysis framework to identify Android malware☆146Updated 7 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆108Updated 10 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 8 years ago
- This application attempts to detect android overlay attacks☆44Updated 2 years ago
- PoC framework for APK obfuscation☆52Updated 10 years ago
- Android Malware Detection Framework☆81Updated 8 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆194Updated 9 years ago
- Popular Android threats in 2019☆251Updated 5 years ago
- Android app analysis and feature extraction library☆225Updated 4 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated 2 years ago
- Android stuff☆28Updated 10 years ago
- An overlay attack example☆28Updated 7 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆54Updated 8 years ago
- ☆54Updated 8 years ago
- ARES: Android Reverse Engineering Suite is a security suite for analyzing Android .apk files.☆31Updated 8 years ago
- Mobile security trainings based on android☆106Updated 4 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago
- Dalvik Monitoring Framework for CuckooDroid☆92Updated 9 years ago
- Look for interesting things in an APK and inject logging☆47Updated 12 years ago
- Proof of Concept example of Android Malware used for Research Purposes☆22Updated 8 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆125Updated 9 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- Encrypting a PNG into an Android application☆67Updated 6 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆85Updated 7 years ago
- Android ADB backup APK Injection POC☆140Updated 10 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Initial Collection of HackingTeam Exploits☆93Updated 10 years ago
- Advanced detection of rooting☆74Updated 9 years ago
- Check Android device security settings☆86Updated 5 years ago