wphungsuk / android-security
Android Security
☆29Updated 11 years ago
Alternatives and similar repositories for android-security:
Users that are interested in android-security are comparing it to the libraries listed below
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 9 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- Control Flow Graph Scanning for Android☆59Updated 9 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 12 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- Configurable, flexible regex-based APK modification tool.☆36Updated 7 years ago
- HelDroid: Dissect Android Apps Looking for Ransomware Functionalities☆54Updated 8 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- Android Malware Detection Framework☆81Updated 8 years ago
- Extracting the strings from the .dex files with meaning.☆12Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- Dalvik Monitoring Framework for CuckooDroid☆92Updated 8 years ago
- Android OAT Plugin for JEB☆47Updated last year
- ☆12Updated 7 years ago
- slide and full exploit☆86Updated 4 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- ☆9Updated 10 years ago
- Fast detection of repackaged Android applications based on the comparison of resource files included into the package.☆72Updated 2 years ago
- Running TaintDroid from the command line and analyze output☆17Updated 13 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 9 years ago
- ☆16Updated 9 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 9 years ago
- ☆91Updated 8 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago