jonmetz / AndroFuzzLinks
A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process
☆38Updated 10 years ago
Alternatives and similar repositories for AndroFuzz
Users that are interested in AndroFuzz are comparing it to the libraries listed below
Sorting:
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- ☆44Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆24Updated 7 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- RTSP network protocol fuzzer☆64Updated 11 years ago
- Malware detection using learning and information retrieval for Android☆73Updated 4 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 8 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- ☆12Updated 9 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 6 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- ☆19Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Updated 8 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago