zyrikby / StaDynA
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications
☆23Updated last year
Alternatives and similar repositories for StaDynA:
Users that are interested in StaDynA are comparing it to the libraries listed below
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Taming Reflection to Support Whole-Program Analysis of Android Apps☆50Updated 4 years ago
- A smali emulator.☆24Updated 6 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 4 years ago
- ☆24Updated 7 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Updated 7 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆32Updated 2 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- ☆31Updated 8 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Updated 6 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆15Updated 9 years ago
- Control Flow Graph Scanning for Android☆59Updated 9 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆104Updated 9 years ago
- Symbolic Execution of Android Framework☆15Updated 7 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆28Updated 10 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆101Updated 7 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆43Updated 3 years ago