MFFA - Media Fuzzing Framework for Android Logo

MFFA - Media Fuzzing Framework for Android

0
Free
Visit Website

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software components in Android to be decoded and/or played and monitor the system for potential issues (i.e system crashes) that may lead to exploitable vulnerabilities. Custom developed Python scripts are used to send the malformed data across a distributed infrastructure of Android devices, log the findings and monitor for possible issues, in an automated manner. The actual decoding of the media files on the Android devices is done using the Stagefright command line interface. The results are sorted out, in an attempt to find only the unique issues, using a custom built triage mechanism.

FEATURES

ALTERNATIVES

A distributed systems and infrastructure simulator for attacking and debugging Kubernetes.

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

A collection of tests for Local File Inclusion (LFI) vulnerabilities using Burp Suite.

A guide to bypassing RFID card reader security mechanisms using specialized hardware

A tool for enumerating and attacking GitHub Actions pipelines

Collection of URLs for vulnerable web applications and systems for cybersecurity practice.

Collection of Return-Oriented Programming challenges for practicing exploitation skills.

A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.