ucsb-seclab / android_broken_fingersLinks
☆18Updated 7 years ago
Alternatives and similar repositories for android_broken_fingers
Users that are interested in android_broken_fingers are comparing it to the libraries listed below
Sorting:
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Symbolic Execution of Android Framework☆15Updated 8 years ago
- An Android port of radamsa fuzzer☆67Updated 6 years ago
- ☆13Updated 9 years ago
- PoC framework for APK obfuscation☆52Updated 10 years ago
- PoC code for CVE-2018-9539☆20Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 8 years ago
- An Android port of the melkor ELF fuzzer☆62Updated 11 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- PoC code for CVE-2017-13253☆37Updated 5 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Updated 2 years ago
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- A smart file fuzzer.☆26Updated 9 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- Symbol REPL☆31Updated 7 years ago
- A smali emulator.☆25Updated 7 years ago
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆72Updated 5 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Updated 11 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆52Updated 5 years ago
- Fighting String Encryption in Android Malware☆59Updated 3 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆57Updated 6 years ago
- Shim to grab keystore backed data☆27Updated 8 years ago
- JEB Scripts☆21Updated 11 years ago
- Vulnerability Reports by Aleph Research☆35Updated last year
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Updated 8 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Updated 9 years ago