AbhiTheModder / NewPineExample
PoC of using android:name attribute for hooking
☆19Updated 5 months ago
Alternatives and similar repositories for NewPineExample:
Users that are interested in NewPineExample are comparing it to the libraries listed below
- Android Protection Bypass Stuff that I compiled from few resources.☆13Updated 2 years ago
- ☆16Updated 3 months ago
- Python tool to unpack/repackage Xamarin assembly store☆13Updated 3 months ago
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.☆61Updated 2 years ago
- Compare APKs☆19Updated last year
- Promon Shield String Deobfuscator☆33Updated 4 months ago
- Your APK Search Engine☆26Updated last week
- ☆41Updated 2 years ago
- vApp-Inject is a Virtual Box application project designed to provide users with the ability to run Android games and apps independently w…☆23Updated 11 months ago
- Android Dex保护工具 基于nmmp-vm项目简单修改☆22Updated 2 months ago
- A Frida script for hooking Android apps on arm/arm64 devices. It intercepts android_dlopen_ext, detects popular protectors (e.g., DexProt…☆11Updated 2 weeks ago
- Easy-to-use Android library for tampering detection, with a sample app included☆51Updated 3 weeks ago
- ☆50Updated 3 years ago
- ☆19Updated last year
- Flutter Mobile Application Reverse Engineering Tool (Termux)☆75Updated 2 weeks ago
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.