Pinned Repositories
ADEL
Android Data Extractor Lite
android
A Document Repository for android tips and info
AppExtract
AppExtract for Android generates a list of both, installed and running apps. These lists can be transferred via email to an analyst for further analysis.
droidsec.github.io
The droidsec web site!
MasteringPythonForensics
Scripts from the "Mastering Python Forensics" book
mobile-sandbox
Source code and tools of the original Mobile-Sandbox release (outdated)
MobileForensics
Additional Material for the Mobile Forensics Course
MobileSandbox
Source code and tools of the former Mobile-Sandbox
python-itunes
A simple python wrapper to access iTunes Store API http://www.apple.com/itunes/affiliates/resources/documentation/itunes-store-web-service-search-api.html
mspreitz's Repositories
mspreitz/ADEL
Android Data Extractor Lite
mspreitz/mobile-sandbox
Source code and tools of the original Mobile-Sandbox release (outdated)
mspreitz/MobileForensics
Additional Material for the Mobile Forensics Course
mspreitz/MobileSandbox
Source code and tools of the former Mobile-Sandbox
mspreitz/MasteringPythonForensics
Scripts from the "Mastering Python Forensics" book
mspreitz/AppExtract
AppExtract for Android generates a list of both, installed and running apps. These lists can be transferred via email to an analyst for further analysis.
mspreitz/droidsec.github.io
The droidsec web site!
mspreitz/python-itunes
A simple python wrapper to access iTunes Store API http://www.apple.com/itunes/affiliates/resources/documentation/itunes-store-web-service-search-api.html
mspreitz/android
A Document Repository for android tips and info
mspreitz/cve-2015-1538-1
An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution
mspreitz/CVE-2015-3636
PoC code for 32 bit Android OS