Android-Observatory / DEXtripadorLinks
A tool to extract the DEX file from ODEX compiled ahead of time version.
☆11Updated 4 years ago
Alternatives and similar repositories for DEXtripador
Users that are interested in DEXtripador are comparing it to the libraries listed below
Sorting:
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 6 years ago
- Utility to read custom structure from Tencent's libshell packer☆39Updated 7 years ago
- A collection of secRet frida scripts☆66Updated 5 years ago
- Frida module utils, writen in typescript☆16Updated last year
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Updated 5 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- ☆32Updated 6 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 6 years ago
- ☆19Updated 6 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆104Updated 8 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 3 years ago
- rewrite dex file☆42Updated 4 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆22Updated 4 years ago
- ☆29Updated 5 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆20Updated 2 years ago
- Tamper detection in Android☆92Updated 4 years ago
- Android library for detecting Android virtual containers.☆71Updated 5 years ago
- JDB++ an jdb extension for easily debugging through smali code☆24Updated 6 months ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆29Updated 11 years ago
- ☆18Updated 3 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 3 years ago
- JNI Helper Plugin☆54Updated last year
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Java-layer Android Malware Simplifier☆27Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 5 years ago
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- Files used to resolve the r2pay challenge☆55Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago