Android greybox fuzzing with AFL++ Frida mode Logo

Android greybox fuzzing with AFL++ Frida mode

0
Free
Visit Website

This repository contains the material associated with the blogpost Android greybox fuzzing with AFL++ Frida mode. A CMakeLists.txt file that allows to build AFL++ Frida mode for Android 12 aarch64; The Android application used as the fuzzing target; The jenv library that allows the initialization of a Java environment from a native harness; A standard native function harness; A weakly linked JNI function harness; Information about the build and the use of this material is in the blogpost.

FEATURES

ALTERNATIVES

A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

An open-source penetration testing framework for social engineering with custom attack vectors.

PwnAuth is an open-source tool for generating and managing authentication tokens for penetration testing and red teaming exercises.

FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.

Python Exploit Development Assistance for GDB with enhanced debugging features and commands for exploit development.

A Linux-based environment for penetration testing and vulnerability exploitation

A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.

Stealing Signatures and Making One Invalid Signature at a Time.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved