0xbinder / deepxtractLinks
Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes and mimeTypes
☆10Updated 10 months ago
Alternatives and similar repositories for deepxtract
Users that are interested in deepxtract are comparing it to the libraries listed below
Sorting:
- Proof-of-concept code for Android APEX key reuse vulnerability☆96Updated last year
- PoC of CVE-2022-20474☆16Updated 4 months ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Updated 6 months ago
- Android Overlay Hijack☆25Updated 9 months ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆30Updated 2 months ago
- Getting better stacks and backtraces in Frida☆48Updated 2 weeks ago
- ☆51Updated last year
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆42Updated last year
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆22Updated 3 months ago
- ☆69Updated 9 months ago
- CVE-2025-21479 proof-of-concept, I think☆26Updated this week
- ☆53Updated 4 months ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆59Updated last year
- ☆31Updated 3 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆28Updated 3 years ago
- CVE-2024-0044☆10Updated 10 months ago
- Generic Frida Script To Bypass Root Detection☆55Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆52Updated 3 years ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆19Updated 3 weeks ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated last week
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆65Updated 2 years ago
- PendingIntent exploit☆11Updated last year
- Generate Frida hooks directly from JEB!☆85Updated 2 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated last year
- CVE-2025-0087 EoP full PoC☆17Updated 3 months ago
- Find JNI native methods while the app is running.☆21Updated 8 months ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- Some tools when playing with Android☆15Updated last month
- ☆119Updated 2 years ago
- Root takeover via signature spoofing in KernelSU☆17Updated last year