All Projects → CHEF-KOCH → Android Vulnerabilities Overview

CHEF-KOCH / Android Vulnerabilities Overview

Licence: mit
An small overview of known Android vulnerabilities

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Android Vulnerabilities Overview

CameraSlider
3D printed and smartphone controlled camera slider
Stars: ✭ 16 (-94.33%)
Mutual labels:  smartphone
qctf-school-2018
QCTF School 2018. Developed with ♥ by Hackerdom team
Stars: ✭ 13 (-95.39%)
Mutual labels:  vulnerabilities
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.33%)
Mutual labels:  vulnerabilities
DoliDroid
DoliDroid is the free Android frontend client, it is not a standalone program. It is a front end to use an online hosted Dolibarr ERP CRM https://www.dolibarr.org
Stars: ✭ 20 (-92.91%)
Mutual labels:  smartphone
phdctf-2017
PHDays Online CTF 2017. Developed with ♥ by Hackerdom team
Stars: ✭ 22 (-92.2%)
Mutual labels:  vulnerabilities
ConPan
ConPan: Analyze your Docker container in peace
Stars: ✭ 45 (-84.04%)
Mutual labels:  vulnerabilities
master-thesis
Выпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
Stars: ✭ 84 (-70.21%)
Mutual labels:  vulnerabilities
Dvws
OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.
Stars: ✭ 267 (-5.32%)
Mutual labels:  vulnerabilities
vulnerabilities
List of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-95.04%)
Mutual labels:  vulnerabilities
pattern-lock-js
An android inspired pattern lock in scalable vector graphics and pure javascript
Stars: ✭ 51 (-81.91%)
Mutual labels:  smartphone
Zerooo-Exploitation-Framework
异步漏洞利用框架
Stars: ✭ 22 (-92.2%)
Mutual labels:  vulnerabilities
penetration testing
🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-79.79%)
Mutual labels:  vulnerabilities
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-78.37%)
Mutual labels:  vulnerabilities
PhoneVR
Use Steam VR-enabled applications with your phone as HMD (Head-mounted display). The only Open-Source solution to similar commercial packages like VRidge, iVRy, Trinus etc etc.
Stars: ✭ 178 (-36.88%)
Mutual labels:  smartphone
cloudgallery
Nativescript photo gallery app for Nextcloud
Stars: ✭ 34 (-87.94%)
Mutual labels:  smartphone
clair-cicd
Making CoreOS' Clair easily work in CI/CD pipelines
Stars: ✭ 27 (-90.43%)
Mutual labels:  vulnerabilities
clusterfuzzlite
ClusterFuzzLite - Simple continuous fuzzing that runs in CI.
Stars: ✭ 315 (+11.7%)
Mutual labels:  vulnerabilities
Buildapks
Really quickly build APKs on handheld device (smartphone and tablet) in Amazon, Android, Chromebook, PRoot and Windows📲 See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Stars: ✭ 272 (-3.55%)
Mutual labels:  smartphone
Kube Hunter
Hunt for security weaknesses in Kubernetes clusters
Stars: ✭ 3,399 (+1105.32%)
Mutual labels:  vulnerabilities
bluenet
Bluenet is the in-house firmware on Crownstone hardware. Functions: switching, dimming, energy monitoring, presence detection, indoor localization, switchcraft.
Stars: ✭ 79 (-71.99%)
Mutual labels:  smartphone

Android Vulnerabilities Overview (AVO) is a databse of known security vulnerabilities in Android.

The vulnerabilities database is splitted into seperate .md files to get an better and cleaner overview. The current 2016 list is avaible over here.

The security flaw gives hacker ability to spy on Android smartphone owners, steal login credentials, install malware, and many more, according to the latest research conducted by the researchers at the Pennsylvania State University and FireEye.

Contact

Twitter URL Say Thanks! Discord

Found something that isn't on the list? - Feel free to submit, maintainers/contributors are always welcome!

Want to communicate secure, feel free - my eMail public key is stored in the 'eMail.txt' file.

Warning

Do not install security updates like CVE-2015-1538.apk from untrusted sources! It's a trap!

Security updates are rolled out by Google Play-services (in background) or as ROM update directly from your provider and never comes as single .APK!

Attacks

Spyware Capabilities

  • Listening in to telephone conversations
  • Accessing the Internet
  • Viewing and copy contacts
  • Installing unwanted apps
  • Asking for location data
  • Taking and copying images
  • Recording conversations using the microphone
  • Sending and reading SMS/MMS
  • Disabling Anti-Virus software
  • Listening in to chats via messaging services (Skype, Viber, WhatsApp, Facebook and Google+)
  • Reading the browser history

Infected apps with Backdoors, Loggers or Ransomware

Generally apps that often bundled with security risks (due popularity and other weaknesses)

Research

Papers

Videos

Online tests

Kernel

'Security' (pentesting) Apps

Forensics analysis software and apps

In most cases Trojans/Malware only sending 'stuff' to there C&C's if you're on wifi (to not getting easier detected by the bandwidth consumptation itself), of course they often drain your battery, so some tools are to detect such cases and identifys them (like Hush) such tools can be used to reveal what exactly going on behind the scenes.

Vulnerability Databases

Known Pre-Installed Backdoors (within firmware)

Backdoor Discussion

‘Stingrays’ Cell Phone Trackers

Stingrays, made by the Harris Corporation, has capabilities to access user's unique IDs and phone numbers, track and record locations, and sometimes even intercept Internet traffic and phone calls, send fake texts and install spyware on phones. The authorities used these tracking tools for years to breach people's privacy and did everything to keep even the existence of these devices out of the public eye. They even avoid telling judges when they used them.

Firewall Leak Tests

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].