matthewrossi / seapp
Bringing Mandatory Access Control to Android apps
☆10Updated 3 years ago
Alternatives and similar repositories for seapp:
Users that are interested in seapp are comparing it to the libraries listed below
- Extract both control flow graphs and code parts from APK based on API calls.☆18Updated 2 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 4 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- This hosts the original version of the PScout Android permission mapping tool☆21Updated 6 years ago
- An app intended for fuzzing the Android Binder interface and System Services☆99Updated 4 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated last year
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆28Updated this week
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 3 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- ☆28Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆115Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆62Updated 2 years ago
- Something To Do Android Application Security Research☆10Updated 3 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 4 years ago
- Android 14 Beta 1 framework/services source code, reverse engineered from a Pixel 7 Pro (upb1.230309.014)☆16Updated 2 years ago
- Fuzzing framework to target native components of android applications☆19Updated 2 years ago
- Tamper detection in Android☆88Updated 4 years ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- TapJacking Attacks Demo☆19Updated 4 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆89Updated last year
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 9 years ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆27Updated 4 months ago
- ACVTool (Android Code Coverage Tool) is a tool to measure fine-grained code coverage of 3rd-party Android apps.☆123Updated 3 months ago
- A smali emulator.☆25Updated 6 years ago
- Proof of concept app for Android permanent denial-of-service vulnerability CVE-2020-0443☆16Updated 3 years ago
- Slim dockerized Android ndk☆12Updated 2 years ago