MFFA - Media Fuzzing Framework for Android Logo

MFFA - Media Fuzzing Framework for Android

0
Free
Visit Website

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software components in Android to be decoded and/or played and monitor the system for potential issues (i.e system crashes) that may lead to exploitable vulnerabilities. Custom developed Python scripts are used to send the malformed data across a distributed infrastructure of Android devices, log the findings and monitor for possible issues, in an automated manner. The actual decoding of the media files on the Android devices is done using the Stagefright command line interface. The results are sorted out, in an attempt to find only the unique issues, using a custom built triage mechanism.

FEATURES

ALTERNATIVES

Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

Docker image with essential tools for Kubernetes penetration testing.

Emulate operating systems behind SSH servers for testing automation.

A practical guide on NTLM relaying for Active Directory attacks.

Self-hosted Fuzzing-As-A-Service platform for continuous developer-driven fuzzing.

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

A collection of scripts for Turbo Intruder, a penetration testing tool

Cutting-edge open-source security tools for adversary simulation and threat hunting.

PINNED