nelenkov / android-device-checkLinks
Check Android device security settings
☆89Updated 6 years ago
Alternatives and similar repositories for android-device-check
Users that are interested in android-device-check are comparing it to the libraries listed below
Sorting:
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 9 years ago
- Shim to grab keystore backed data☆27Updated 8 years ago
- Mobile security trainings based on android☆108Updated 5 years ago
- An overlay attack example☆29Updated 8 years ago
- Advanced detection of rooting☆74Updated 10 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆85Updated 8 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- Look for interesting things in an APK and inject logging☆47Updated 12 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆138Updated 5 years ago
- Runtime memory analysis framework to identify Android malware☆147Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 8 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Frida FDE bruteforce Samsung S7 Edge☆50Updated 6 years ago
- PoC framework for APK obfuscation☆52Updated 10 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112Updated 10 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆83Updated 2 years ago
- ☆175Updated 4 years ago
- PoC to bypass Android restrictions☆217Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆104Updated 8 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 10 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆74Updated 2 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆89Updated 8 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Updated 9 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆125Updated 7 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆103Updated 4 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆29Updated 11 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Updated 5 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Updated 2 years ago
- Android Hacking Event 2017 Write-up☆44Updated 8 years ago