riusksk / AndroidKernelExploitationPlaygroundLinks
☆7Updated 9 years ago
Alternatives and similar repositories for AndroidKernelExploitationPlayground
Users that are interested in AndroidKernelExploitationPlayground are comparing it to the libraries listed below
Sorting:
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- JEB Scripts☆21Updated 10 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- ☆24Updated 7 years ago
- A malware sandoxed with gdb☆15Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- PoC code for CVE-2017-13253☆37Updated 4 years ago
- Collection of IDA scripts☆41Updated 7 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- ELF header abuse☆48Updated 9 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code …☆29Updated 6 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 9 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆54Updated 8 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- ☆31Updated 9 years ago
- ☆51Updated 8 years ago