Skip to content
@droid-sec

droid-sec

Popular repositories Loading

  1. ContentProviderHelper ContentProviderHelper Public

    Forked from jenzz/ContentProviderHelper

    A nice little Android app that helps developers to discover and query content providers.

    Java

  2. android-vts android-vts Public

    Forked from AndroidVTS/android-vts

    Android Vulnerability Test Suite - In the spirit of open data collection, and with the help of the community, let's take a pulse on the state of Android security. NowSecure presents an on-device ap…

    Java

  3. Mobile-Security-Framework-MobSF Mobile-Security-Framework-MobSF Public

    Forked from MobSF/Mobile-Security-Framework-MobSF

    Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis.

    Python

  4. qark qark Public

    Forked from linkedin/qark

    HTML

  5. lobotomy lobotomy Public

    Forked from UsefulAnd/lobotomy

    Android Security Toolkit

    Python

  6. MFFA MFFA Public

    Forked from fuzzing/MFFA

    Media Fuzzing Framework for Android

    Python

Repositories

Showing 10 of 36 repositories
  • Inspeckage Public Forked from ac-pm/Inspeckage

    Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)

    droid-sec/Inspeckage’s past year of commit activity
    Java 0 Apache-2.0 532 0 0 Updated May 8, 2016
  • Metaphor Public Forked from NorthBit/Metaphor

    Metaphor - Stagefright with ASLR bypass

    droid-sec/Metaphor’s past year of commit activity
    Python 0 GPL-3.0 118 0 0 Updated Mar 24, 2016
  • Android-Inline-Hook Public Forked from ele7enxxh/Android-Inline-Hook

    thumb16 thumb32 arm32 inlineHook in Android

    droid-sec/Android-Inline-Hook’s past year of commit activity
    Makefile 0 431 0 0 Updated Feb 23, 2016
  • hooker Public Forked from AndroidHooker/hooker

    Hooker is an opensource project for dynamic analyses of Android applications. This project provides various tools and applications that can be use to automaticaly intercept and modify any API calls made by a targeted application.

    droid-sec/hooker’s past year of commit activity
    Python 0 GPL-3.0 115 0 0 Updated Jan 28, 2016
  • Androl4b Public Forked from sh4hin/Androl4b

    A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis

    droid-sec/Androl4b’s past year of commit activity
    0 281 0 0 Updated Jan 27, 2016
  • AndroidAPIHooker Public Forked from guanchao/AndroidAPIHooker

    使用cydia substrate框架hook android的关键api,实时记录观察app后台运行时所调用的所有敏感函数,并生成json日志输出

    droid-sec/AndroidAPIHooker’s past year of commit activity
    Java 0 38 0 0 Updated Jan 15, 2016
  • arminject Public Forked from evilsocket/arminject

    An application to dynamically inject a shared object into a running process on ARM architectures.

    droid-sec/arminject’s past year of commit activity
    C++ 0 165 0 0 Updated Jan 3, 2016
  • scaredycat Public Forked from eudemonics/scaredycat

    Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploits another Stagefright vulnerability, the integer overflow (CVE-2015-3864).

    droid-sec/scaredycat’s past year of commit activity
    Python 0 15 0 0 Updated Dec 8, 2015
  • stagefright Public Forked from eudemonics/stagefright

    Python script to generate a malicious MP4 file exploiting the 'stsc' vulnerability (CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution), and start reverse TCP listener on attacker machine.

    droid-sec/stagefright’s past year of commit activity
    Python 0 125 0 0 Updated Dec 8, 2015
  • ContentProviderHelper Public Forked from jenzz/ContentProviderHelper

    A nice little Android app that helps developers to discover and query content providers.

    droid-sec/ContentProviderHelper’s past year of commit activity
    Java 0 54 0 0 Updated Dec 4, 2015

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…