Training materials crafted and publicly provided by Red Naga members
☆435Jan 2, 2018Updated 8 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- ☆567May 30, 2018Updated 7 years ago
- ☆90Mar 15, 2017Updated 8 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆505Mar 19, 2019Updated 6 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- Static Code Analysis for Smali files☆325Oct 3, 2019Updated 6 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Sep 14, 2015Updated 10 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- AduitDroid☆120Oct 12, 2016Updated 9 years ago
- ☆79May 13, 2016Updated 9 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,895Oct 23, 2020Updated 5 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- This software will emulate a smali source file generated by apktool.☆475Aug 14, 2018Updated 7 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,419Jan 29, 2026Updated last month
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- ☆175Aug 16, 2021Updated 4 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 9 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆312Apr 7, 2023Updated 2 years ago
- Media Fuzzing Framework for Android☆333Apr 1, 2016Updated 9 years ago
- Android File Fuzzing Framework☆87Jun 7, 2022Updated 3 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- AAMO: Another Android Malware Obfuscator☆124Oct 28, 2015Updated 10 years ago
- A Collection of Secure Mobile Development Best Practices☆565Jan 25, 2024Updated 2 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago