yuanchun-li / HybridFlowView external linksLinks
static taint analysis of hybrid Android Apps (Java + HTML)
☆13Jan 9, 2022Updated 4 years ago
Alternatives and similar repositories for HybridFlow
Users that are interested in HybridFlow are comparing it to the libraries listed below
Sorting:
- ☆14Oct 11, 2017Updated 8 years ago
- DroidSafe Android Static Analysis Source Repository☆97Apr 17, 2017Updated 8 years ago
- Security Certifier for anDroid☆58Apr 9, 2013Updated 12 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- statically vetting android apps based soot☆19Dec 24, 2015Updated 10 years ago
- Static Analysis Framework for Android Hybrid Applications☆25Oct 13, 2020Updated 5 years ago
- Java-layer Android Malware Simplifier☆27Jan 21, 2022Updated 4 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- IFDS/IDE Solver for Soot and other frameworks☆254Updated this week
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- Find broken SSL certificate validation in Android Apps☆62Dec 4, 2022Updated 3 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Mimicking grids in Android lists☆148Apr 15, 2015Updated 10 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Whatever apt group's js from their scanbox framework☆11Jun 22, 2016Updated 9 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Set of tools for anti DDOS attacks protection on shared/dedicated hosting☆11Jan 31, 2014Updated 12 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- A specific SSDP Scanner for the SSDP Attack Script☆11Sep 6, 2014Updated 11 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- 开源waf web 防火墙☆10Nov 30, 2021Updated 4 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- ☆11Mar 29, 2019Updated 6 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- High-performance capability engine for AI agents. Cryptographically attenuated warrants, task-scoped authority, Rust core.☆25Updated this week
- ARTist's deployment application, for code-injection on an Android device.☆39Sep 12, 2019Updated 6 years ago
- Constructed BER-TLV Encoder and Decoder in C☆12Jul 12, 2024Updated last year