This repository contains the material associated with the blogpost Android greybox fuzzing with AFL++ Frida mode. A CMakeLists.txt file that allows to build AFL++ Frida mode for Android 12 aarch64; The Android application used as the fuzzing target; The jenv library that allows the initialization of a Java environment from a native harness; A standard native function harness; A weakly linked JNI function harness; Information about the build and the use of this material is in the blogpost.
FEATURES
SIMILAR TOOLS
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
A digital archive of the internet, allowing users to capture and browse archived web pages.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.
A suite of tools for Wi-Fi network security assessment and penetration testing.
SharpEDRChecker scans system components to detect security products and tools.
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.