Skip to content

ucam-cl-dtg/android-vulnerabilities

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

AndroidVulnerabilities.org

The https://androidvulnerabilities.org/ website and source data.

To run

  • Download Poole and set it up on your system
  • Clone this repository onto your system
  • In the root directory of this repository, run:
    • poole.py --build --md-ext=markdown.extensions.extra to build the source code (may take a long time)
    • poole.py --serve to run the website
  • Then go to [http://localhost:8080] to view the site

Other utilities

  • The web scraper (tools/scraper/scraper.py) will take vulnerability details from Google's Android Security Bulletins. Please see tools/scraper/README.md for more details.
  • Graph analysis tools:
    • analyser.py plots a month-by-month matrix of how different Android versions can be exploited
    • actual_usage.py uses the Google Play Dashboard usage data to estimate the number of devices which can be exploited in different ways over time
    • device_analyzer_usage.py does a similar process using data gathered by the Device Analyzer project
    • scorer.py plots an overall vulnerability score over time for different versions of Android

Data on vulnerability storage format is in input/vulnerabilities.

About

The androidvulnerabilities.org website and source data

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published