ucsb-seclab / agrigentoLinks
Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.
☆72Updated 5 years ago
Alternatives and similar repositories for agrigento
Users that are interested in agrigento are comparing it to the libraries listed below
Sorting:
- An Android port of radamsa fuzzer☆67Updated 6 years ago
- Control Flow Graph Scanning for Android☆61Updated 10 years ago
- ☆90Updated 8 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆52Updated 5 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Android File Fuzzing Framework☆87Updated 3 years ago
- Symbolic/concolic execution of Android apps☆57Updated 9 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- The Static Android Analysis Framework.☆40Updated 10 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 10 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 7 years ago
- r2con 2017 September 6-9☆97Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- libfuzzerfication - fuzzing for the rest of us!☆61Updated 8 years ago
- An automated NFC fuzzing framework for Android devices.☆142Updated 5 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- A place for disclosing things☆43Updated 9 years ago
- ☆33Updated 9 years ago
- Android Malware Detection Framework☆81Updated 8 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆55Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Updated 10 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- Slides, Papers, Links to CVEs and advisories☆77Updated 8 years ago
- slide and full exploit☆87Updated 5 years ago
- Python concolic execution framework for program analysis☆68Updated 11 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 10 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆52Updated last year
- Find broken SSL certificate validation in Android Apps☆62Updated 3 years ago