gsbabil / AntiTaintDroidLinks
AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit
☆42Updated 7 years ago
Alternatives and similar repositories for AntiTaintDroid
Users that are interested in AntiTaintDroid are comparing it to the libraries listed below
Sorting:
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 7 years ago
- Control Flow Graph Scanning for Android☆63Updated 10 years ago
- ☆31Updated 9 years ago
- An Android port of radamsa fuzzer☆68Updated 6 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- An Android port of the melkor ELF fuzzer☆63Updated 11 years ago
- ☆35Updated 9 years ago
- Fuzzing framework for third part library of android system☆22Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 10 years ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆39Updated 11 years ago
- Symbolic Execution of Android Framework☆15Updated 8 years ago
- reproduce the experiment in the report.☆28Updated 11 years ago
- ☆34Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Updated 10 years ago
- Running TaintDroid from the command line and analyze output☆17Updated 13 years ago
- ☆27Updated 9 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆52Updated 5 years ago
- ☆16Updated 10 years ago
- A dynamic information flow tracing system for Android☆54Updated 4 years ago
- Run android with S2E☆31Updated 11 years ago
- An APK instrumentation library and DroidBox APIMonitor☆57Updated 12 years ago
- slide and full exploit☆87Updated 5 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 10 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 10 years ago
- ☆16Updated 8 years ago
- write-what-where plus heap address leaking in OMX☆36Updated 10 years ago
- ☆38Updated 9 years ago
- Android Vulnerability Reports and POCs.☆27Updated 9 years ago
- ☆23Updated 10 years ago