LeakVM: Run security tests instantly.
LeakVM fast security test on Android, by skipping the time-consuming build pen-testing laboratories, you can test on real devices or virtual devices. LeakVM makes researchers and pen-testers more productive since they can run the test on real time and with zero knowledge on malware develop or attacks.
Our technology uses the same techniques used in criminal software, but in a controlled environment, you always have control over the SDK, our product, gives you a real approach against real malware and real attacks.
sandbox of any package ?
Yes, you can.
I can load external libraries ?
Yes, from Git’s, Mediafire and another sources.
I can start a HTTP service ?
Yes, as synchronous and asynchronous way.
I can start a HTTP client ?
Yes, we have one, very configurable.
I can analyze security on ELF as V.A.S ? Yes, you can.
I can bypass OOP protections ?
Yes, there not exist: ‘package’, ‘private’, ‘protected’ or ‘final’.
I can extract private files from external packages ?
Yes, you can see and get any file.
I can hack the Keystore ?
Yes, you can.
I can trick the Context ?
Yes, you can.
I can hack the SmartLock ?
Yes, you can.
I can use reflections in simple way ?
Yes, you can.
I can see the system in simple way ?
Yes, you can.
I can install it on simple way ?
Yes, just with 2 lines on the gradle.
I can develop plugins with it ?
Yes, on the same way as AAR library.
Any can use it in a simple way ?
Yes, we develop it for dummies.
- Ptrace/ASLR/Yama Bypass
- API for 3rd party projects
- Linux common features
- Dynamic library loading
- SmartLock extraction
- Private file extractor
- KeyStore extraction
- Advanced reflection
- WebServices Engine
- Privilege escalation
- Context Spoofers
- Core Observers
- Library injection
- OOP Bypass
- Extensible
- Android 4.4 to 6.0
- Architectures Arm(32/64 bits), x86(32/64 bits), MIPS(32/64 bits)