AndroidHooker / hookerLinks
Hooker is an opensource project for dynamic analyses of Android applications. This project provides various tools and applications that can be use to automaticaly intercept and modify any API calls made by a targeted application.
☆409Updated 8 years ago
Alternatives and similar repositories for hooker
Users that are interested in hooker are comparing it to the libraries listed below
Sorting:
- An Xposed and adbi based module which is capable of hooking both Java and Native methods targeting Android OS.☆477Updated 8 years ago
- Security profiling for blackbox Android☆474Updated 11 years ago
- Lets you hook Method Calls in Frida ( Android )☆392Updated 5 years ago
- Android Debugging Library☆598Updated 8 years ago
- A generic DEX file obfuscator and munger☆265Updated 9 years ago
- ddi - Dynamic Dalvik Instrumentation Toolkit☆395Updated 10 years ago
- Static Code Analysis for Smali files☆322Updated 5 years ago
- A SDK for the creation of analysis tools without obtaining app source code in order to profile runtime performance, examine code coverage…☆199Updated 6 years ago
- A (hopefully) generic unpacker for packed Android apps.☆363Updated 3 years ago
- GUI for Frida -Scripts☆179Updated 8 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- Extended oatdump from AOSP platform/art repo☆137Updated 7 years ago
- AduitDroid☆120Updated 8 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆498Updated 6 years ago
- An application to dynamically inject a shared object into a running process on ARM architectures.☆451Updated 8 years ago
- Dalvik Monitoring Framework for CuckooDroid☆92Updated 8 years ago
- A Program Analysis Toolkit for Android☆118Updated 8 years ago
- Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0☆1,144Updated 5 years ago
- Slides and demo resources presented at HITCON 2014 & XCON 2014-"Guess Where I am-Android模拟器躲避的检测与应对"☆201Updated 10 years ago
- Android ADB backup APK Injection POC☆139Updated 9 years ago
- restart adbd with root privileges☆166Updated 8 years ago
- ☆154Updated last year
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆149Updated 10 years ago
- Black box tool to bypass SSL verification on Android, even when pinning is used.☆325Updated 12 years ago
- AAMO: Another Android Malware Obfuscator☆124Updated 9 years ago