0x3xploit / frida-android-jni-hookingLinks
Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for security testing and debugging.
☆45Updated last year
Alternatives and similar repositories for frida-android-jni-hooking
Users that are interested in frida-android-jni-hooking are comparing it to the libraries listed below
Sorting:
- Easy-to-use Android library for tampering detection, with a sample app included☆60Updated 6 months ago
- https://github.com/frida/frida-python with devkit☆30Updated 2 months ago
- PoC of using android:name attribute for hooking☆20Updated last week
- Toolset which makes possible hiddenly inject code in Android apps through system libraries☆61Updated 2 months ago
- Stealth patch for Frida, stealth knowledge collection☆105Updated last year
- Contains all the scripts and sample apps related to android in app protections.☆31Updated last year
- Portable frida injector for rooted android devices.☆205Updated 2 years ago
- ☆57Updated 7 months ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆20Updated 3 years ago
- App for learnfrida.info☆20Updated 3 years ago
- Android Protection Bypass Stuff that I compiled from few resources.☆16Updated 2 years ago
- Android reverse-engineering tool / smali editor☆184Updated 3 weeks ago
- Dynamic injection tool for Linux/Android☆180Updated 9 months ago
- Getting better stacks and backtraces in Frida☆53Updated last month
- Pine and Frida better together☆14Updated 11 months ago
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.☆67Updated 2 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Add frida-gadgets into APK for non rooted devices.☆67Updated 6 months ago
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Updated 2 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆54Updated this week
- A quick and dirty script to bypass SSL pinning of Flutter applications☆31Updated last year
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆24Updated 6 months ago
- Extracting unpacked dec files from running application using frida.☆39Updated 2 years ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆27Updated 4 months ago
- xVision is a plugin for the JadX decompiler that aims to integrate with Large Language Models (LLMs) to provide code analysis directly in…☆63Updated 4 months ago
- Promon Shield String Deobfuscator☆36Updated 5 months ago
- ☆43Updated 3 years ago
- Deobfuscate "paranoid" protected apps☆68Updated 6 months ago
- ☆92Updated 3 years ago
- Zygisk-based reFlutter☆134Updated 4 months ago