Android Vulnerability Test Suite Logo

Android Vulnerability Test Suite

0
Free
Visit Website

This tool was meant to show the end user the attack surface that a given device is susceptible to. In implementing these checks we attempt to minimize or eliminate both false positives/false negatives without negatively affecting system stability. Rationale for necessity: When a vulnerability is discovered, Google receives word and applies a patch to Android. The Nexus devices are usually the devices that receive these patches quickest as they deviate the least (read: not at all) from AOSP (Android Open Source Project - The core of Android, where Google commits to). For example, the futex bug (CVE-2014-3153/Towelroot) was known about in late May, early June. This bug took multiple months to get patched on the flagship (at the time) Nexus 5. This leaves users extremely vulnerable to attack from applications. Users mostly do not know that their devices are vulnerable.

FEATURES

ALTERNATIVES

A comprehensive database of exploits and vulnerabilities for researchers and professionals

Script to find exploits for vulnerable software packages on Linux systems using an exploit database.

An open-source attack surface management platform for identifying and managing vulnerabilities

A tool for detecting and preventing secrets in code

Automate the search for Exploits and Vulnerabilities in important databases.

A vulnerable Android application demonstrating various security issues and vulnerabilities

A comprehensive guide to Android Security

Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved