rednaga / training
Training materials crafted and publicly provided by Red Naga members
☆432Updated 7 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆589Updated 4 years ago
- This software will emulate a smali source file generated by apktool.☆475Updated 6 years ago
- Static Code Analysis for Smali files☆322Updated 5 years ago
- Repository to train/learn memory corruption on the ARM platform.☆353Updated 8 years ago
- A collection of reverse engineering challenges for learning about the Android operating system and mobile security.☆363Updated 4 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- ☆561Updated 6 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆307Updated 2 years ago
- Android Emulator for mobile security testing☆226Updated 3 years ago
- Media Fuzzing Framework for Android☆335Updated 9 years ago
- Metaphor - Stagefright with ASLR bypass☆314Updated 9 years ago
- ☆169Updated 3 years ago
- A list of my CVE's with POCs☆675Updated 4 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆384Updated 6 years ago
- Hooker is an opensource project for dynamic analyses of Android applications. This project provides various tools and applications that c…☆409Updated 8 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆79Updated 8 years ago
- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis☆1,131Updated last year
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Updated 5 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆321Updated 7 years ago
- Black box tool to bypass SSL verification on Android, even when pinning is used.☆324Updated 12 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- ☆280Updated 4 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆679Updated 5 years ago
- Initial Collection of HackingTeam Exploits☆92Updated 9 years ago
- Android ADB backup APK Injection POC☆139Updated 9 years ago
- A W.I.P Android Security Ref☆953Updated last month
- Deprecated Binary Ninja prototype written in Python☆523Updated 4 years ago
- Android APK analyzer based on radare2 and others.☆154Updated 5 years ago
- CTF Writeups☆186Updated 7 years ago