rewhy / NDroidLinks
☆20Updated 4 years ago
Alternatives and similar repositories for NDroid
Users that are interested in NDroid are comparing it to the libraries listed below
Sorting:
- Framework for investigating VM-based Android packers☆36Updated 3 years ago
- To conduct accurate network measurement from the Android kernel layer.☆14Updated 3 years ago
- Adaptive Unpacking Android Packed Applications☆39Updated 3 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- ☆23Updated 2 years ago
- Hardware Assisted Unpacking of Android Apps☆57Updated 4 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Updated 2 years ago
- ☆86Updated last year
- ☆16Updated last year
- ☆25Updated 2 years ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆27Updated 7 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- Symbolic Execution Over Processor Traces☆126Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆38Updated last year
- BigMAC: Analysis tool to introspect and query Android security policies.☆41Updated 2 years ago
- Source code of MEUZZ fuzzer☆46Updated 4 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Updated 6 months ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- ☆20Updated 7 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆119Updated 3 months ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆23Updated 3 years ago
- Benchmark apps for static analyzing native world of Android applications.☆13Updated 7 years ago
- Librarian: An Empirical Study of Security Updates in Android Apps’ Native Code☆21Updated 5 years ago