matthewrossi / seapp
Bringing Mandatory Access Control to Android apps
☆10Updated 3 years ago
Alternatives and similar repositories for seapp
Users that are interested in seapp are comparing it to the libraries listed below
Sorting:
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 4 years ago
- An app intended for fuzzing the Android Binder interface and System Services☆101Updated 4 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated last year
- Extract both control flow graphs and code parts from APK based on API calls.☆19Updated 2 years ago
- Slim dockerized Android ndk☆12Updated 2 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- This hosts the original version of the PScout Android permission mapping tool☆22Updated 6 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 9 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 3 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- Tamper detection in Android☆89Updated 4 years ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆64Updated 2 years ago
- Frida module utils, writen in typescript☆16Updated last year
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Updated 5 months ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆42Updated 3 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- A note on basic android kernel development.☆18Updated 7 months ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆116Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- Something To Do Android Application Security Research☆10Updated 4 years ago
- Android OTA image analysis preprocessing automation tool.☆10Updated 2 years ago
- This project is intended to do some penetration tests of Android system services☆18Updated 2 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆10Updated 9 months ago
- An overlay attack example☆26Updated 7 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- Android 14 Beta 1 framework/services source code, reverse engineered from a Pixel 7 Pro (upb1.230309.014)☆16Updated 2 years ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆29Updated 3 weeks ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆25Updated 3 months ago