Android-Observatory / DEXtripadorLinks
A tool to extract the DEX file from ODEX compiled ahead of time version.
☆11Updated 3 years ago
Alternatives and similar repositories for DEXtripador
Users that are interested in DEXtripador are comparing it to the libraries listed below
Sorting:
- Frida module utils, writen in typescript☆16Updated last year
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 5 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 6 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆22Updated 3 years ago
- ☆18Updated 5 years ago
- ☆32Updated 5 years ago
- Tamper detection in Android☆90Updated 4 years ago
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- DroidGuard VM Samples☆56Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago
- JNI Helper Plugin☆53Updated 7 months ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆40Updated 4 years ago
- ☆28Updated 5 years ago
- rewrite dex file☆42Updated 3 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated last year
- Some crackme i built for Android☆12Updated 5 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- Higher-level Python interface for frida☆22Updated last week
- ☆28Updated 4 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- ☆35Updated 6 years ago
- JDB++ an jdb extension for easily debugging through smali code☆23Updated 4 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆67Updated 4 years ago
- InHouse safetynet killer☆31Updated 6 years ago
- Fuzzing framework to target native components of android applications☆21Updated 2 years ago
- Files used to resolve the r2pay challenge☆52Updated 4 years ago