Aurasium Logo

Aurasium

0
Free
Visit Website

Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor. Aurasium's code is released under GPLv3. Code Structure: - ApkMonitor/: The main native and java policy logic, bundled with a demo app. - pyAPKRewriter/: The APK patching scripts. - dependencies/: pyAPKRewriter's dependencies - SecurityManager/: ASM for Aurasium Dependency Android SDK apt-get install unzip python python-pyasn1 Usage: To repackage an APK file: pyAPKRewriter/attach.sh source.apk [desktination.apk] To build a new version of Aurasium for repackaging: First build ApkMonitor/ under Eclispe. Then create an updated Aurasium blob by make in ApkMonitor/package. Finally copy aurasium.zip to dependencies/

FEATURES

ALTERNATIVES

Leveraging WebDAV features for covert communication and payload delivery.

Detects and handles potential malware in Microsoft Exchange 2019 messages with various techniques and third-party libraries.

Aggregates known Android security vulnerabilities with detailed examples and analysis.

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.

A novel genetic algorithm for automating censorship evasion strategies.

A project providing a low-cost ICS testbed with affordable hardware, instructions, and attacker scenarios to facilitate learning in industrial security.

A tool for extracting static and dynamic features from Android APKs.