programa-stic / marvin-djangoLinks
Marvin-django is the UI/database part of the Marvin project. Marvin is a platform for security analysis of Android apps.
☆74Updated 6 months ago
Alternatives and similar repositories for marvin-django
Users that are interested in marvin-django are comparing it to the libraries listed below
Sorting:
- Network and USB protocol fuzzing toolkit.☆34Updated 8 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- Android File Fuzzing Framework☆87Updated 3 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- Broadcast Intent FUZzing Framework for Android☆81Updated 10 years ago
- Android Device Testing Framework ("dtf")☆85Updated 2 years ago
- ☆79Updated 9 years ago
- ☆90Updated 8 years ago
- Server component of the mobile labs☆36Updated 13 years ago
- A Cuckoo Sandbox Extension for Android☆76Updated 10 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆44Updated 2 years ago
- Break Apps with Frida workshop material☆46Updated 7 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆54Updated 8 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 6 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Android Emulator for mobile security testing☆228Updated 3 years ago
- Android APK analyzer based on radare2 and others.☆154Updated 5 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆109Updated 10 years ago
- ☆44Updated 10 years ago
- ☆48Updated 10 years ago
- Android based APT exploitation framework☆36Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago