rednaga / trainingLinks
Training materials crafted and publicly provided by Red Naga members
☆432Updated 7 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- This software will emulate a smali source file generated by apktool.☆475Updated 6 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆592Updated 4 years ago
- Static Code Analysis for Smali files☆323Updated 5 years ago
- Metaphor - Stagefright with ASLR bypass☆317Updated 9 years ago
- Android Emulator for mobile security testing☆227Updated 3 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆309Updated 2 years ago
- A collection of reverse engineering challenges for learning about the Android operating system and mobile security.☆361Updated 4 years ago
- ☆560Updated 7 years ago
- Repository to train/learn memory corruption on the ARM platform.☆355Updated 8 years ago
- Media Fuzzing Framework for Android☆334Updated 9 years ago
- ☆280Updated 5 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Updated 7 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆358Updated 5 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆644Updated 5 years ago
- A list of my CVE's with POCs☆674Updated 4 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆387Updated 6 years ago
- CTF Writeups☆187Updated 7 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆79Updated 8 years ago
- Teach you a binary exploitation for great good.☆295Updated 6 years ago
- Deprecated Binary Ninja prototype written in Python☆524Updated 4 years ago
- An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution☆205Updated 9 years ago
- BootStomp: a bootloader vulnerability finder☆403Updated 3 years ago
- ☆172Updated 3 years ago
- *This project is no longer maintained* OWASP GoatDroid is a fully functional and self-contained training environment for educating develo…☆244Updated 10 years ago
- Documentation for the Mechanical Phish.☆234Updated 8 years ago
- Droidefense: Advance Android Malware Analysis Framework☆483Updated 2 years ago
- ☆350Updated 9 years ago
- Grinder is a system to automate the fuzzing of web browsers and the management of a large number of crashes.☆416Updated 2 years ago