zyrikby / StaDynALinks
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications
☆23Updated 2 years ago
Alternatives and similar repositories for StaDynA
Users that are interested in StaDynA are comparing it to the libraries listed below
Sorting:
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 5 years ago
- A smali emulator.☆25Updated 6 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Generic exploit for master key vulnerability in Android☆33Updated 10 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- linux version (rewrite in Python)☆29Updated 10 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆15Updated 10 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 6 years ago
- Control Flow Graph Scanning for Android☆59Updated 10 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Symbolic Execution of Android Framework☆15Updated 7 years ago
- ☆24Updated 7 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆109Updated 10 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆106Updated 7 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- ☆31Updated 9 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- Xposed module for obtaining SQLCipher crypto keys☆37Updated 7 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- Symbolic/concolic execution of Android apps☆56Updated 9 years ago