hac425xxx / whatsapp-fuzzingLinks
☆18Updated 5 years ago
Alternatives and similar repositories for whatsapp-fuzzing
Users that are interested in whatsapp-fuzzing are comparing it to the libraries listed below
Sorting:
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- ☆18Updated 3 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆29Updated 3 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆44Updated last year
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- ☆32Updated 5 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- ☆61Updated 8 months ago
- PoC of CVE-2022-20474☆18Updated 7 months ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- rewrite dex file☆42Updated 3 years ago
- ☆91Updated 2 years ago
- JNI Helper Plugin☆53Updated 9 months ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Updated 5 years ago
- 基于angr的污点分析引擎☆41Updated 6 years ago
- ☆12Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆67Updated 3 years ago
- ☆31Updated last year
- you can use frida in jeb !☆46Updated 2 years ago
- ☆62Updated 5 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 5 years ago
- use frida monitoring android app☆49Updated 6 years ago
- ☆24Updated last year
- USB device fuzzing on Android Phone☆32Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago