ucsb-seclab / agrigento
Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.
☆69Updated 4 years ago
Alternatives and similar repositories for agrigento:
Users that are interested in agrigento are comparing it to the libraries listed below
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- ☆91Updated 7 years ago
- The Static Android Analysis Framework.☆39Updated 9 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- Control Flow Graph Scanning for Android☆59Updated 9 years ago
- A system to record malware using PANDA☆43Updated 5 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 9 years ago
- Symbolic/concolic execution of Android apps☆56Updated 8 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 9 years ago
- Dalvik Monitoring Framework for CuckooDroid☆91Updated 8 years ago
- ☆34Updated 8 years ago
- libfuzzerfication - fuzzing for the rest of us!☆62Updated 8 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆47Updated 4 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆53Updated 8 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆53Updated 8 years ago
- ☆48Updated 7 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 6 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated last year
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆110Updated 8 years ago
- Dynamic security analysis of embedded systems’ firmwares☆80Updated 8 years ago
- slide and full exploit☆86Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago