rewhy / NDroidLinks
☆20Updated 4 years ago
Alternatives and similar repositories for NDroid
Users that are interested in NDroid are comparing it to the libraries listed below
Sorting:
- To conduct accurate network measurement from the Android kernel layer.☆14Updated 3 years ago
- Framework for investigating VM-based Android packers☆36Updated 3 years ago
- Adaptive Unpacking Android Packed Applications☆39Updated 3 years ago
- ☆23Updated 2 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Updated 2 years ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Updated 5 years ago
- ☆85Updated last year
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- Source code of MEUZZ fuzzer☆46Updated 4 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆119Updated 2 months ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- Hardware Assisted Unpacking of Android Apps☆57Updated 4 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- ☆16Updated last year
- Benchmark apps for static analyzing native world of Android applications.☆13Updated 7 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆41Updated last week
- ☆63Updated 2 years ago
- ☆34Updated 4 years ago
- ☆23Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- ☆57Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46Updated 5 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- ☆26Updated last year
- ☆26Updated 2 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆41Updated 2 years ago