Android greybox fuzzing with AFL++ Frida mode Logo

Android greybox fuzzing with AFL++ Frida mode

0
Free
Visit Website

This repository contains the material associated with the blogpost Android greybox fuzzing with AFL++ Frida mode. A CMakeLists.txt file that allows to build AFL++ Frida mode for Android 12 aarch64; The Android application used as the fuzzing target; The jenv library that allows the initialization of a Java environment from a native harness; A standard native function harness; A weakly linked JNI function harness; Information about the build and the use of this material is in the blogpost.

FEATURES

ALTERNATIVES

SharpEDRChecker scans system components to detect security products and tools.

A free, safe, and legal training ground for ethical hackers to test and expand their skills

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.

A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

A free and open source C2 and proxy for penetration testers

Collection of penetration testing scripts for AWS with a focus on reconnaissance.

A tool for mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing