Android greybox fuzzing with AFL++ Frida mode Logo

Android greybox fuzzing with AFL++ Frida mode

0
Free
Visit Website

This repository contains the material associated with the blogpost Android greybox fuzzing with AFL++ Frida mode. A CMakeLists.txt file that allows to build AFL++ Frida mode for Android 12 aarch64; The Android application used as the fuzzing target; The jenv library that allows the initialization of a Java environment from a native harness; A standard native function harness; A weakly linked JNI function harness; Information about the build and the use of this material is in the blogpost.

FEATURES

ALTERNATIVES

RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.

A guide to bypassing RFID card reader security mechanisms using specialized hardware

A tool for Local File Inclusion (LFI) exploitation and scanning

Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.

A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.

PINNED