rednaga / trainingLinks
Training materials crafted and publicly provided by Red Naga members
☆434Updated 7 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- This software will emulate a smali source file generated by apktool.☆476Updated 7 years ago
- Static Code Analysis for Smali files☆323Updated 6 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆595Updated 4 years ago
- Metaphor - Stagefright with ASLR bypass☆318Updated 9 years ago
- Android Emulator for mobile security testing☆227Updated 3 years ago
- Repository to train/learn memory corruption on the ARM platform.☆355Updated 8 years ago
- A collection of reverse engineering challenges for learning about the Android operating system and mobile security.☆363Updated 4 years ago
- ☆562Updated 7 years ago
- ☆280Updated 5 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆389Updated 6 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- Media Fuzzing Framework for Android☆334Updated 9 years ago
- Deprecated Binary Ninja prototype written in Python☆524Updated 5 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆650Updated 6 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆311Updated 2 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆356Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆236Updated 6 months ago
- An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution☆204Updated 10 years ago
- CTF Writeups☆189Updated 7 years ago
- Teach you a binary exploitation for great good.☆294Updated 7 years ago
- A list of my CVE's with POCs☆676Updated 4 years ago
- Files from my DEFCON CTF VM.☆270Updated 9 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Updated 8 years ago
- *This project is no longer maintained* OWASP GoatDroid is a fully functional and self-contained training environment for educating develo…☆246Updated 11 years ago
- Security profiling for blackbox Android☆480Updated 11 years ago
- ☆351Updated 10 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 8 years ago
- Android APK analyzer based on radare2 and others.☆154Updated 5 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago