Ayrx / FindNativeJNIMethodsLinks
☆27Updated 5 years ago
Alternatives and similar repositories for FindNativeJNIMethods
Users that are interested in FindNativeJNIMethods are comparing it to the libraries listed below
Sorting:
- ☆32Updated 6 years ago
- Utility to read custom structure from Tencent's libshell packer☆40Updated 6 years ago
- A collection of secRet frida scripts☆65Updated 4 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆90Updated 7 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- ☆34Updated last month
- A frida module to parse Elf headers in runtime☆36Updated 6 years ago
- unpack UPX on android.☆34Updated 6 years ago
- DroidGuard VM Samples☆64Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆140Updated last year
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- ☆18Updated 6 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆164Updated 5 years ago
- rewrite dex file☆41Updated 3 years ago
- JNI Helper Plugin☆54Updated 11 months ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 6 years ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- Frida module to continue stalking on pthread_create☆20Updated 5 years ago
- Some reverse-engineering scripts☆119Updated 6 years ago
- My own collection of Frida scripts and tricks☆68Updated 4 years ago
- Android Library Code Recognition☆83Updated last year
- deobfuscation ollvm's fla☆67Updated 7 years ago
- Files used to resolve the r2pay challenge☆54Updated 5 years ago
- A portable utility to locate android binder service☆97Updated 6 years ago
- Syscall table hook frame in Android kernel for arm and arm64☆82Updated 8 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 6 years ago
- a universal and automated unpacking system☆44Updated 7 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago