rednaga / keystore-shimLinks
Shim to grab keystore backed data
☆27Updated 8 years ago
Alternatives and similar repositories for keystore-shim
Users that are interested in keystore-shim are comparing it to the libraries listed below
Sorting:
- JEB Scripts☆21Updated 10 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 11 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- ☆24Updated 8 years ago
- Configurable, flexible regex-based APK modification tool.☆37Updated 8 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Vulnerability Reports by Aleph Research☆35Updated last year
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆22Updated 6 years ago
- PoC framework for APK obfuscation☆52Updated 10 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 9 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆89Updated 9 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Updated 9 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 8 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆54Updated 8 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆108Updated 10 years ago
- LD_PRELOAD magic for Android's AssetManager☆79Updated 3 years ago
- Xposed module for obtaining SQLCipher crypto keys☆39Updated 7 years ago
- A place for disclosing things☆43Updated 9 years ago
- ELF header abuse☆48Updated 9 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago