rostomzed / Android-Security-Assessment-Tools
This contains a list of tools for security assessments of android applications.
☆26Updated this week
Alternatives and similar repositories for Android-Security-Assessment-Tools:
Users that are interested in Android-Security-Assessment-Tools are comparing it to the libraries listed below
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆41Updated last week
- Scapy hands-on☆34Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- A Static and Extensible Black-box Application Security Testing tool for iOS and Android applications☆32Updated 5 months ago
- Automatically fuzz Rust projects from scratch☆55Updated 11 months ago
- ☆49Updated last week
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆110Updated last year
- Slides and videos from my public speeches / conferences☆74Updated 2 weeks ago
- ☆16Updated 6 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆60Updated last week
- Reverse Engineering and Observability toolkit for Draytek firewalls☆39Updated last month
- damn-exploitable-android-app-apk☆38Updated last year
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆27Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- ☆93Updated 3 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆48Updated last year
- Slides and other material from various conference presentations.☆44Updated 3 weeks ago
- ☆44Updated 3 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- A burp for intents wannabe☆69Updated 8 months ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆34Updated last year
- Read only mirror - No pull requests☆19Updated 3 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆89Updated last year
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Collection of my Security Blueprints & Guides☆45Updated last month
- Type diagram plugin for JADX decompiler☆59Updated 2 months ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆99Updated 7 months ago