mspreitz's Stars
libimobiledevice/libimobiledevice
A cross-platform protocol library to communicate with iOS devices
mac4n6/iOS-Frequent-Locations-Dumper
Dump the iOS Frequent Location binary plist files
SerpicoProject/Serpico
SimplE RePort wrIting and COllaboration tool
ashishb/android-security-awesome
A collection of android security related resources
nowsecure/secure-mobile-development
A Collection of Secure Mobile Development Best Practices
jpenalbae/r2-scripts
Multiple radare2 rpipe scripts
AndroidVTS/android-vts
Android Vulnerability Test Suite - In the spirit of open data collection, and with the help of the community, let's take a pulse on the state of Android security. NowSecure presents an on-device app to test for recent device vulnerabilities.
fesh0r/fernflower
Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
fi01/CVE-2015-3636
PoC code for 32 bit Android OS
google/enjarify
pxb1988/dex2jar
Tools to work with android .dex and java .class files
androguard/androguard
Reverse engineering and pentesting for Android applications
iosre/iOSAppReverseEngineering
The world’s 1st book of very detailed iOS App reverse engineering skills :)
rednaga/training
Training materials crafted and publicly provided by Red Naga members
google/binnavi
BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
linkedin/qark
Tool to look for several security related Android application vulnerabilities
504ensicsLabs/LiME
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.
USArmyResearchLab/Dshell
Dshell is a network forensic analysis framework.
idanr1986/cuckoo-droid
CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.
cuckoosandbox/cuckoo
Cuckoo Sandbox is an automated dynamic malware analysis system
log2timeline/l2tbinaries
Binaries for the log2timeline projects and dependencies
williballenthin/python-evtx
Pure Python parser for Windows Event Log files (.evtx)
iSECPartners/Android-SSL-TrustKiller
Bypass SSL certificate pinning for most applications
nelenkov/android-backup-extractor
Android backup extractor
java-decompiler/jd-gui
A standalone Java Decompiler GUI
JesusMcCloud/magnumpi
Magnum PI -- Dynamic Application Analysis on Android
radareorg/radare2
UNIX-like reverse engineering framework and command-line toolset
dmayer/idb
idb is a tool to simplify some common tasks for iOS pentesting and research
Stericson/RootTools
RootTools Library
SpazeDog/rootfw
An Android Root Shell Framework