This repository contains the material associated with the blogpost Android greybox fuzzing with AFL++ Frida mode. A CMakeLists.txt file that allows to build AFL++ Frida mode for Android 12 aarch64; The Android application used as the fuzzing target; The jenv library that allows the initialization of a Java environment from a native harness; A standard native function harness; A weakly linked JNI function harness; Information about the build and the use of this material is in the blogpost.
FEATURES
SIMILAR TOOLS
Tool for exploiting Sixnet RTUs to gain root level access with little effort.
A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.
A post-exploitation tool for Azure Active Directory and Office 365 environments that manages access tokens and provides interactive access to Microsoft 365 services.
Check if a domain is in the Alexa or Cisco top one million domain list.
Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.
A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.