rewhy / NDroid
☆20Updated 3 years ago
Alternatives and similar repositories for NDroid:
Users that are interested in NDroid are comparing it to the libraries listed below
- To conduct accurate network measurement from the Android kernel layer.☆14Updated 3 years ago
- Framework for investigating VM-based Android packers☆35Updated 3 years ago
- Adaptive Unpacking Android Packed Applications☆38Updated 3 years ago
- On-device non-invasive dynamic analysis of Android apps with high code coverage☆15Updated 3 years ago
- Hardware Assisted Unpacking of Android Apps☆55Updated 3 years ago
- ☆23Updated last year
- Framework for testing the reachability of native functions in Android applications.☆11Updated last year
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆23Updated 6 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 4 months ago
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆38Updated last year
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆48Updated 3 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆34Updated last year
- Benchmark apps for static analyzing native world of Android applications.☆12Updated 6 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- ☆83Updated 4 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆57Updated last year
- Full implementaion of Genius☆31Updated last year
- BigMAC: Analysis tool to introspect and query Android security policies.☆37Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆86Updated 2 months ago
- ☆10Updated 2 years ago
- ☆15Updated last year
- A state-aware defense framework against vehicular message injection attacks.☆35Updated 3 years ago
- ☆7Updated 4 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- Source-binary patch presence test system.☆83Updated 2 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 4 years ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Updated 4 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- ☆23Updated last year