Training materials crafted and publicly provided by Red Naga members
☆435Jan 2, 2018Updated 8 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆505Mar 19, 2019Updated 7 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- Static Code Analysis for Smali files☆325Oct 3, 2019Updated 6 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- ☆567May 30, 2018Updated 7 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- AduitDroid☆120Oct 12, 2016Updated 9 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,892Oct 23, 2020Updated 5 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Sep 14, 2015Updated 10 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,435Jan 29, 2026Updated last month
- This software will emulate a smali source file generated by apktool.☆473Aug 14, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- Metaphor - Stagefright with ASLR bypass☆317Mar 24, 2016Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- ☆174Aug 16, 2021Updated 4 years ago
- ☆79May 13, 2016Updated 9 years ago
- Media Fuzzing Framework for Android☆333Apr 1, 2016Updated 9 years ago
- Android Vulnerability Test Suite - In the spirit of open data collection, and with the help of the community, let's take a pulse on the s…☆1,027Aug 2, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Android Dynamic Binary Instrumentation tool for tracing Android native layer☆313Apr 7, 2023Updated 2 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- AAMO: Another Android Malware Obfuscator☆124Oct 28, 2015Updated 10 years ago
- A Collection of Secure Mobile Development Best Practices☆565Jan 25, 2024Updated 2 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆604Nov 7, 2020Updated 5 years ago
- Broadcast Intent FUZzing Framework for Android☆80Jun 26, 2015Updated 10 years ago