Android greybox fuzzing with AFL++ Frida mode Logo

Android greybox fuzzing with AFL++ Frida mode

0
Free
Updated 11 March 2025
Visit Website

This repository contains the material associated with the blogpost Android greybox fuzzing with AFL++ Frida mode. A CMakeLists.txt file that allows to build AFL++ Frida mode for Android 12 aarch64; The Android application used as the fuzzing target; The jenv library that allows the initialization of a Java environment from a native harness; A standard native function harness; A weakly linked JNI function harness; Information about the build and the use of this material is in the blogpost.

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

Tool for exploiting Sixnet RTUs to gain root level access with little effort.

A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.

A post-exploitation tool for Azure Active Directory and Office 365 environments that manages access tokens and provides interactive access to Microsoft 365 services.

Check if a domain is in the Alexa or Cisco top one million domain list.

Pentest active directory LAB project for practicing attack techniques.

A post-exploitation tool for pentesting Active Directory

A DNS rebinding exploitation framework

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved