necst / aamo
AAMO: Another Android Malware Obfuscator
☆124Updated 9 years ago
Alternatives and similar repositories for aamo:
Users that are interested in aamo are comparing it to the libraries listed below
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆211Updated 10 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated 2 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆79Updated 8 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆88Updated 7 years ago
- Dalvik Monitoring Framework for CuckooDroid☆92Updated 8 years ago
- A Program Analysis Toolkit for Android☆118Updated 7 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆191Updated 9 years ago
- Android Malware Detection Framework☆81Updated 8 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- ☆169Updated 3 years ago
- Exploit for Android Zip bugs: 8219321, 9695860, and 9950697☆144Updated 10 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆106Updated 10 years ago
- Android ADB backup APK Injection POC☆139Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Updated 8 years ago
- Android app analysis and feature extraction library☆223Updated 4 years ago
- Android File Fuzzing Framework☆86Updated 2 years ago
- Runtime memory analysis framework to identify Android malware☆145Updated 7 years ago
- Dex manipulation library☆103Updated 9 years ago
- Android Security☆29Updated 11 years ago
- Initial Collection of HackingTeam Exploits☆92Updated 9 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- This application attempts to detect android overlay attacks☆44Updated last year
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 12 years ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆38Updated 10 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆137Updated 9 years ago