MFFA - Media Fuzzing Framework for Android Logo

MFFA - Media Fuzzing Framework for Android

0
Free
Visit Website

The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software components in Android to be decoded and/or played and monitor the system for potential issues (i.e system crashes) that may lead to exploitable vulnerabilities. Custom developed Python scripts are used to send the malformed data across a distributed infrastructure of Android devices, log the findings and monitor for possible issues, in an automated manner. The actual decoding of the media files on the Android devices is done using the Stagefright command line interface. The results are sorted out, in an attempt to find only the unique issues, using a custom built triage mechanism.

FEATURES

ALTERNATIVES

A tool for detecting and taking over subdomains with dead DNS records

A free and open source C2 and proxy for penetration testers

A tool for managing multiple reverse shell sessions/clients via terminal with a RESTful API.

Collection of URLs for vulnerable web applications and systems for cybersecurity practice.

A PowerShell toolkit for attacking Azure environments

Collection of vulnerable ARM binaries for beginner vulnerability researchers & exploit developers.

A post-exploitation framework for attacking running AWS infrastructure

A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.