0xbinder / deepxtract
Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes and mimeTypes
☆10Updated 7 months ago
Alternatives and similar repositories for deepxtract:
Users that are interested in deepxtract are comparing it to the libraries listed below
- ☆50Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆88Updated last year
- Android Overlay Hijack☆22Updated 6 months ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆25Updated 3 months ago
- ☆49Updated last month
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- ☆64Updated 6 months ago
- Small Apps As PoC to Detect Frida With Frida☆51Updated 3 years ago
- PoC of CVE-2022-20474☆13Updated 2 months ago
- ☆30Updated 2 years ago
- Generate Frida hooks directly from JEB!☆80Updated last year
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆57Updated 11 months ago
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆32Updated 3 years ago
- Generic Frida Script To Bypass Root Detection☆55Updated 2 years ago
- Getting better stacks and backtraces in Frida☆37Updated 9 months ago
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆19Updated last week
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆27Updated 2 years ago
- obpo backend server written by golang☆32Updated last year
- Android-DirtyStream Vuln Demo☆27Updated 10 months ago
- Some tools when playing with Android☆9Updated last week
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆53Updated this week
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆21Updated 9 months ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated last year
- CVE-2024-0044☆10Updated 7 months ago
- PendingIntent exploit☆11Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆21Updated last year
- CVE-2024-31317☆29Updated 3 months ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆16Updated 3 weeks ago
- Some tools when playing with HarmonyOS NEXT☆20Updated 5 months ago
- ☆116Updated last year