geeksonsecurity / android-overlay-protection
This application attempts to detect android overlay attacks
☆43Updated last year
Related projects ⓘ
Alternatives and complementary repositories for android-overlay-protection
- Advanced detection of rooting☆70Updated 8 years ago
- Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header☆70Updated 11 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆31Updated 6 years ago
- Tamper detection in Android☆85Updated 3 years ago
- Contains many different ways to identify hostile environments.☆63Updated 8 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- A very rudimentary Android DEX file parser☆66Updated 10 years ago
- Configurable, flexible regex-based APK modification tool.☆35Updated 7 years ago
- Android OAT Plugin for JEB☆46Updated last year
- An overlay attack example☆26Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆97Updated 7 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆70Updated last year
- A Program Analysis Toolkit for Android☆118Updated 7 years ago
- The Android Runtime Instrumentation Toolkit☆23Updated 8 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆86Updated 6 years ago
- Exploit for Android Zip bugs: 8219321, 9695860, and 9950697☆144Updated 10 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆117Updated 9 years ago
- Create different graphs from Android DEX bytecode to get insight in the code structure.☆18Updated 3 years ago
- PoC framework for APK obfuscation☆53Updated 9 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- An ugly hack to do something, like start an intent, while being uninstalled by the system☆23Updated 7 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 8 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆33Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆81Updated 10 months ago