wtsxDev / android-security-list
Collection of Android security related resources
☆99Updated last year
Alternatives and similar repositories for android-security-list:
Users that are interested in android-security-list are comparing it to the libraries listed below
- OASAM is the acronym of Open Android Security Assessment Methodology and its purpose is to become a reference framework on Android applic…☆85Updated 2 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆119Updated 6 years ago
- Android security labs☆109Updated 5 years ago
- Mobile security trainings based on android☆104Updated 4 years ago
- Penetration testing and auditing toolkit for Android apps.☆235Updated 4 years ago
- Malware detection using learning and information retrieval for Android☆73Updated 4 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- Runtime memory analysis framework to identify Android malware☆142Updated 6 years ago
- bash script to facilitate some aspects of an Android application assessment☆155Updated 3 years ago
- ☆42Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- ☆26Updated 3 years ago
- Break Apps with Frida workshop material☆43Updated 7 years ago
- Java Object Deserialization on Android☆84Updated 5 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- MobSF related Presentations, Slides and Others.☆32Updated 7 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆107Updated 4 years ago
- Learning Penetration Testing of Android Applications☆77Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆65Updated 6 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- ☆42Updated 10 years ago
- Tool used for dumping memory from Android devices☆66Updated 9 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 4 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 7 years ago
- Extreme Vulnerable Node Application☆93Updated 6 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆101Updated 7 years ago