0xbinder / deepxtractLinks
Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes and mimeTypes
☆11Updated last year
Alternatives and similar repositories for deepxtract
Users that are interested in deepxtract are comparing it to the libraries listed below
Sorting:
- Proof-of-concept code for Android APEX key reuse vulnerability☆101Updated last year
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆36Updated 7 months ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆64Updated last year
- Android Overlay Hijack☆29Updated last year
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆26Updated 11 months ago
- Android-DirtyStream Vuln Demo☆34Updated last year
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆22Updated this week
- ☆58Updated 2 years ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- Generic Frida Script To Bypass Root Detection☆56Updated 3 years ago
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆26Updated 8 months ago
- CVE-2025-0087 EoP full PoC☆21Updated 9 months ago
- Generate Frida hooks directly from JEB!☆87Updated last month
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- ☆83Updated last year
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆43Updated last year
- PoC of CVE-2022-20474☆19Updated 10 months ago
- ☆59Updated 9 months ago
- Getting better stacks and backtraces in Frida☆56Updated 2 weeks ago
- ☆126Updated 2 years ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆138Updated last month
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆31Updated 3 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆58Updated this week
- ☆30Updated last year
- Something To Do Android Application Security Research☆10Updated 4 years ago
- ☆94Updated 3 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated 2 years ago
- a demo poc for CVE-2024-0015☆18Updated last year
- CVE-2024-0044☆12Updated last year