https://github.com/tanprathan/sievePWN
An android application which exploits sieve through android components.
https://github.com/tanprathan/sievePWN
Last synced: 5 months ago
JSON representation
An android application which exploits sieve through android components.
- Host: GitHub
- URL: https://github.com/tanprathan/sievePWN
- Owner: tanprathan
- Created: 2016-02-13T10:35:09.000Z (about 10 years ago)
- Default Branch: master
- Last Pushed: 2017-09-17T10:28:47.000Z (over 8 years ago)
- Last Synced: 2025-07-24T16:37:21.287Z (9 months ago)
- Language: Java
- Homepage:
- Size: 3.97 MB
- Stars: 44
- Watchers: 4
- Forks: 13
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-mobile-CTF - sievePWN
README
# sievePWN
Sieve, which is created from MWR labs(https://labs.mwrinfosecurity.com/system/assets/380/original/sieve.apk), is ‘Password Manager’ App, showcasing some common Android vulnerabilities.
SievePWN is set of android applications which are used to exploit sieve application through android components. The SievePWN include the followings:
####Sievebypass
* Bypass sieve authentication by direct accessing the exported Activity component.
####Sievedt
* Exploit content providers component using Directory Traversal Technique through ParcelFileDescriptor openFile.
####Sieveleak
* Exploit exported component through content providers.
####Sievesqli
* Exploit content providers component through SQL Injection.
### Contribution
Your contributions and suggestions are welcome.
### License
[](http://creativecommons.org/licenses/by/4.0/)
This work is licensed under a [Creative Commons Attribution 4.0 International License](http://creativecommons.org/licenses/by/4.0/)