All Projects → NoahS96 → Cloak-And-Dagger

NoahS96 / Cloak-And-Dagger

Licence: other
An overlay attack example

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Cloak-And-Dagger

apple-knowledge
A collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Stars: ✭ 338 (+1436.36%)
Mutual labels:  exploit
padre
Blazing fast, advanced Padding Oracle exploit
Stars: ✭ 35 (+59.09%)
Mutual labels:  exploit
x64dbgpylib
Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (+109.09%)
Mutual labels:  exploit
Scripts-Sploits
A number of scripts POC's and problems solved as pentests move along.
Stars: ✭ 37 (+68.18%)
Mutual labels:  exploit
RootMyTV.github.io
RootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
Stars: ✭ 745 (+3286.36%)
Mutual labels:  exploit
FastPwn
CTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-18.18%)
Mutual labels:  exploit
vulristics
Extensible framework for analyzing publicly available information about vulnerabilities
Stars: ✭ 46 (+109.09%)
Mutual labels:  exploit
wowned
Authentication bypass for outdated WoW emulation authentication servers
Stars: ✭ 32 (+45.45%)
Mutual labels:  exploit
spellbook
Framework for rapid development and reusable of security tools
Stars: ✭ 67 (+204.55%)
Mutual labels:  exploit
CamRaptor
CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (+381.82%)
Mutual labels:  exploit
Exploits
A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (+240.91%)
Mutual labels:  exploit
exploit
Collection of different exploits
Stars: ✭ 153 (+595.45%)
Mutual labels:  exploit
discord-bugs-exploits
A Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (+0%)
Mutual labels:  exploit
hacker-scripts
⛷ A collection of hacker scripts.
Stars: ✭ 29 (+31.82%)
Mutual labels:  exploit
doona
Network based protocol fuzzer
Stars: ✭ 64 (+190.91%)
Mutual labels:  exploit
CTF
CTF binary exploit code
Stars: ✭ 37 (+68.18%)
Mutual labels:  exploit
IDA Wrapper
An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
Stars: ✭ 14 (-36.36%)
Mutual labels:  exploit
Rage
Rage allows you to execute any file in a Microsoft Office document.
Stars: ✭ 68 (+209.09%)
Mutual labels:  exploit
Umbraco-RCE
Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (+177.27%)
Mutual labels:  exploit
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-13.64%)
Mutual labels:  exploit

CloakandDagger

An overlay attack example

This app is a project for my cybersecurity class and is not intended to be distributed or used in the real world. The design follows the concept created by Yanick Fratantonio, Chenxiong Qian, Simon Pak Ho Chung, and Wenke Lee. More information on their discovery can be found at http://cloak-and-dagger.org/. This app only explores obtaining the SYSTEM_ALERT_WINDOW permission and creating a simple keylogger overlay once granted permission.

Note: This app was tested on a Nexus 5X emulator using API 24. Testing on other devices or API's will likely require modifying the layoutParams x and y dimensions.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].