Android anti-root detection Proof of Concept
☆44May 9, 2015Updated 10 years ago
Alternatives and similar repositories for rd
Users that are interested in rd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Oct 29, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- android apk查壳工具源代码☆17Apr 19, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Capstone disassemble scripts for lldb☆72Aug 14, 2019Updated 6 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- task_for_pid injection that doesn't suck☆58Aug 9, 2015Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Toolkit for binary iOS / OS X sandbox profiles☆146Nov 2, 2015Updated 10 years ago
- A very rudimentary Android DEX file parser☆65Aug 26, 2014Updated 11 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- Build flexible, self-documenting command line interfaces with a minimum amount of code.☆15Dec 2, 2018Updated 7 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Wolfram Alpha shell☆15Dec 27, 2015Updated 10 years ago
- ☆63Oct 22, 2023Updated 2 years ago
- Hopper Disassembler SDK (unofficial repository)☆34Jan 5, 2021Updated 5 years ago
- A Cuckoo Sandbox Extension for Android☆76Jan 11, 2015Updated 11 years ago
- AduitDroid☆120Oct 12, 2016Updated 9 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- DemocracyOS is an online space for deliberation and voting on political proposals. The software aims to stimulate better arguments and co…☆12Mar 2, 2016Updated 10 years ago
- AAMO: Another Android Malware Obfuscator☆124Oct 28, 2015Updated 10 years ago
- mach-o diffing tool☆55Jul 16, 2015Updated 10 years ago
- Generic exploit for master key vulnerability in Android☆33Feb 6, 2015Updated 11 years ago
- Utility to find Unicode characters by name☆15Aug 19, 2015Updated 10 years ago
- Boot to Gecko aims to create a complete, standalone operating system for the open web.☆14Mar 9, 2015Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago