phretor / gplay-scraper
Minimalistic command line Google Play Store scraper for Android apps. Given a search term, it returns a list of package names that match the search.
☆8Updated 8 years ago
Alternatives and similar repositories for gplay-scraper
Users that are interested in gplay-scraper are comparing it to the libraries listed below
Sorting:
- ☆91Updated 8 years ago
- ☆20Updated 10 years ago
- ☆27Updated 9 years ago
- Android anti-root detection Proof of Concept☆43Updated 10 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- CVE-2014-4321 exploit☆20Updated 10 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- A place for disclosing things☆43Updated 8 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- slide and full exploit☆86Updated 4 years ago
- Get symbol address and name from tables for kallsyms☆31Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- Android File Fuzzing Framework☆86Updated 2 years ago
- Android Debug Utility Suite☆17Updated 10 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 9 years ago
- ELF header abuse☆48Updated 9 years ago
- ☆23Updated 9 years ago
- ☆31Updated 9 years ago
- ☆49Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆95Updated 10 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Updated 9 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- The slides and exploit of mosec2016☆112Updated 8 years ago