zyrikby / StaDynA
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications
☆23Updated last year
Alternatives and similar repositories for StaDynA:
Users that are interested in StaDynA are comparing it to the libraries listed below
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- ☆24Updated 7 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- An Android port of the melkor ELF fuzzer☆60Updated 10 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- A smali emulator.☆24Updated 6 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆15Updated 10 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 7 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- Xposed module for obtaining SQLCipher crypto keys☆37Updated 7 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 6 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆103Updated 9 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆56Updated 8 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- Control Flow Graph Scanning for Android☆59Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- This hosts the original version of the PScout Android permission mapping tool☆20Updated 6 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆28Updated 10 years ago