paocela / AndroidNativeFuzzingFrameworkLinks
Fuzzing framework to target native components of android applications
☆20Updated 2 years ago
Alternatives and similar repositories for AndroidNativeFuzzingFramework
Users that are interested in AndroidNativeFuzzingFramework are comparing it to the libraries listed below
Sorting:
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆90Updated 2 years ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- ☆30Updated last year
- ☆18Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆31Updated 2 months ago
- ☆11Updated last week
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆123Updated last year
- ☆31Updated 2 years ago
- ☆11Updated 2 years ago
- ☆32Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- BigMap integration on AFL++☆15Updated 4 years ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 9 months ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated last year
- AFL bindings for Unicorn-Engine☆80Updated this week
- ☆45Updated last year
- Some tee/trustzone helper stuff☆53Updated 5 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 6 months ago
- ☆34Updated 3 years ago
- ☆24Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆42Updated last year
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- ☆30Updated 3 years ago