rostomzed / Android-Security-Assessment-ToolsLinks
This contains a list of tools for security assessments of android applications.
☆33Updated 5 months ago
Alternatives and similar repositories for Android-Security-Assessment-Tools
Users that are interested in Android-Security-Assessment-Tools are comparing it to the libraries listed below
Sorting:
- A Static and Extensible Black-box Application Security Testing tool for iOS and Android applications☆36Updated 5 months ago
- A full-featured open-source Wi-Fi fuzzer☆193Updated 2 weeks ago
- A machine learning malware analysis framework for Android apps.☆133Updated last year
- A curated list of awesome binary analysis automation training, resources, and tools.☆44Updated last year
- Real Android malware apps discussed in the book☆40Updated 2 years ago
- Slides and videos from my public speeches / conferences☆76Updated 4 months ago
- A customizable playground for Android CTF challenges.☆84Updated last week
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- Manage (and soon deploy) Android machines with pre-defined behaviors for Cyber Range environments.☆86Updated last year
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Updated 6 months ago
- ☆113Updated last year
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆114Updated 2 years ago
- Type diagram plugin for JADX decompiler☆67Updated last month
- ☆77Updated 3 months ago
- Vulnerable Android application for Ostolab Security Scanner☆33Updated 5 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 6 months ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆301Updated last year
- Automatically fuzz Rust projects from scratch☆57Updated 3 months ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆65Updated 4 years ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆73Updated last month
- A burp for intents wannabe☆71Updated last year
- Bluetooth Security Assessment Methodology☆137Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- Django application that performs SAST and Malware Analysis for Android APKs☆218Updated last month
- Oversecured Vulnerable iOS App☆229Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆245Updated 6 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 2 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago