MFFA - Media Fuzzing Framework for Android Logo

MFFA - Media Fuzzing Framework for Android

0
Free
Updated 11 March 2025
Visit Website

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software components in Android to be decoded and/or played and monitor the system for potential issues (i.e system crashes) that may lead to exploitable vulnerabilities. Custom developed Python scripts are used to send the malformed data across a distributed infrastructure of Android devices, log the findings and monitor for possible issues, in an automated manner. The actual decoding of the media files on the Android devices is done using the Stagefright command line interface. The results are sorted out, in an attempt to find only the unique issues, using a custom built triage mechanism.

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

A lightweight and portable Docker container for penetration testers and CTF players

A blog post discussing the often overlooked dangers of CSV injection in applications.

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

A blog post about bypassing AppLocker using PowerShell diagnostic scripts

A Python-based tool for identifying and exploiting file inclusion and directory traversal vulnerabilities in web applications.

Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

A CRLF and open redirect fuzzer

A post-exploitation framework designed to operate covertly on heavily monitored environments.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved