Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. Aurasium's code is released under GPLv3. Code Structure: - ApkMonitor/: The main native and java policy logic, bundled with a demo app. - pyAPKRewriter/: The APK patching scripts. - dependencies/: pyAPKRewriter's dependencies - SecurityManager/: ASM for Aurasium Dependency Android SDK apt-get install unzip python python-pyasn1 Usage: To repackage an APK file: pyAPKRewriter/attach.sh source.apk [desktination.apk] To build a new version of Aurasium for repackaging: First build ApkMonitor/ under Eclispe. Then create an updated Aurasium blob by make in ApkMonitor/package. Finally copy aurasium.zip to dependencies/
FEATURES
ALTERNATIVES
Leveraging WebDAV features for covert communication and payload delivery.
Detects and handles potential malware in Microsoft Exchange 2019 messages with various techniques and third-party libraries.
Aggregates known Android security vulnerabilities with detailed examples and analysis.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
A novel genetic algorithm for automating censorship evasion strategies.
A project providing a low-cost ICS testbed with affordable hardware, instructions, and attacker scenarios to facilitate learning in industrial security.
A tool for extracting static and dynamic features from Android APKs.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.