Hide content and notifications from this user.
Contact Support about this user's behavior.
Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
forked from evilsocket/evilbts
Rogue GSM BTS For Fun And Profit
forked from NorthBit/Metaphor
Metaphor - Stagefright with ASLR bypass
forked from rotlogix/exploit-exercises-arm
I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.
This is a basic Python Script to Manipulate and Repackage Android App Packages in an Automated Way
forked from androguard/androguard
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
forked from fi01/CVE-2015-3636
PoC code for 32 bit Android OS
forked from iosre/iOSAppReverseEngineering
The world’s 1st book of very detailed iOS App reverse engineering skills :)
An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution
forked from DesignativeDave/androrat
Remote Administration Tool for Android devices
forked from MozillaSecurity/fuzzdata
Fuzzing resources for feeding various fuzzers with input.
forked from droidsec/droidsec.github.io
The droidsec web site!
forked from maldroid/maldrolyzer
Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)
forked from ctfs/write-ups-2015
Wiki-like CTF write-ups repository, maintained by the community. 2015
mod_antiCrawl: An anti-crawling module for Apache web servers
forked from theos/theos
Unified cross-platform iPhone Makefile system
forked from rpetrich/ldid
Saurik's ldid working on Linux
forked from georgiaw/Smartphone-Pentest-Framework
Repository for the Smartphone Pentest Framework (SPF)
forked from halitalptekin/todo.py
a To Do CLI application with SQLite backend
Using Android Signature Level Permissions to Use Undefined Permissions
forked from jduck/VulnWebView
forked from erggo/Sublime-ARM-Assembly
A bundle for TextMate providing syntax highlighting for ARM assembly code.
Android emulator evasion techniques
forked from pjlantz/droidbox
Dynamic analysis of Android apps
forked from noahwilliamsson/dji-phantom-vision
Decoding DJI Phantom 2 Vision ser2net communication
SMPT User Enumeration by Using NetCat - Python Script
forked from poliva/rootadb
restart adbd with root privileges
forked from KuninoriKunimoto/Spika
Spika is a full-fledged social networking app under MIT license.
forked from kelwin/apkil
An APK instrumentation library and DroidBox APIMonitor