mssun / taintart-art
☆42Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for taintart-art
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆63Updated 5 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- A bunch of JEB python scripts☆46Updated 3 years ago
- A portable utility to locate android binder service☆90Updated 5 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆23Updated 6 years ago
- Container and system event tracing using eBPF☆32Updated this week
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆35Updated last year
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆47Updated 3 years ago
- Hardware Assisted Unpacking of Android Apps☆53Updated 3 years ago
- ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.☆111Updated 5 years ago
- Fuzzing framework for third part library of android system☆21Updated 8 years ago
- statically vetting android apps based soot☆19Updated 8 years ago
- Symbolic Execution of Android Framework☆14Updated 7 years ago
- This hosts the original version of the PScout Android permission mapping tool☆20Updated 6 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 8 years ago
- ☆84Updated 2 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆27Updated 2 years ago
- ☆30Updated last year
- ☆35Updated 2 years ago
- blabla☆47Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- ☆22Updated last year
- Fuzzer targeting Android's IPC☆14Updated 9 years ago
- source code & PoC file of launchAnyWhere problem☆39Updated 10 years ago
- FANS: Fuzzing Android Native System Services☆242Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 7 years ago
- Android Library Code Recognition☆78Updated 6 months ago
- COVA - A static analysis tool to compute path conditions☆32Updated 2 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago