jacobsoo / amtracker
Android Malware Tracker
☆27Updated 10 months ago
Alternatives and similar repositories for amtracker:
Users that are interested in amtracker are comparing it to the libraries listed below
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- ☆26Updated 4 years ago
- Detection Rules for Quark Engine. Please use the website below to explore our rules.☆29Updated 2 years ago
- Official Dexcalibur documentation☆16Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- a State-Machine reversing exercise☆12Updated 3 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 5 years ago
- Android malware threats that spread in 2018☆44Updated 6 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Repository with research related to Android☆13Updated 6 years ago
- android-inject-hook☆16Updated 7 years ago
- This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 1…☆27Updated 4 years ago
- ☆76Updated this week
- A smali emulator.☆24Updated 6 years ago
- ☆18Updated 5 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 3 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- ☆15Updated last year
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- ☆27Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- My own collection of Frida scripts and tricks☆67Updated 3 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 2 years ago
- ☆30Updated 2 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆33Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago