rednaga / trainingLinks
Training materials crafted and publicly provided by Red Naga members
☆434Updated 7 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- This software will emulate a smali source file generated by apktool.☆476Updated 7 years ago
- Metaphor - Stagefright with ASLR bypass☆318Updated 9 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆595Updated 4 years ago
- Static Code Analysis for Smali files☆323Updated 5 years ago
- Android Emulator for mobile security testing☆228Updated 3 years ago
- ☆560Updated 7 years ago
- Repository to train/learn memory corruption on the ARM platform.☆355Updated 8 years ago
- A collection of reverse engineering challenges for learning about the Android operating system and mobile security.☆362Updated 4 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆447Updated 10 years ago
- Media Fuzzing Framework for Android☆334Updated 9 years ago
- ☆280Updated 5 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆310Updated 2 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Deprecated Binary Ninja prototype written in Python☆524Updated 4 years ago
- A list of my CVE's with POCs☆676Updated 4 years ago
- Files from my DEFCON CTF VM.☆269Updated 8 years ago
- ☆350Updated 9 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆356Updated 5 years ago
- Teach you a binary exploitation for great good.☆294Updated 6 years ago
- random brain dumps☆349Updated 8 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆234Updated 5 months ago
- CTF Writeups☆189Updated 7 years ago
- *This project is no longer maintained* OWASP GoatDroid is a fully functional and self-contained training environment for educating develo…☆246Updated 11 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Updated 8 years ago
- ☆173Updated 4 years ago
- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis☆1,141Updated 2 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆649Updated 6 years ago
- The droidsec web site!☆171Updated 11 months ago
- Security advisories☆168Updated 9 years ago