ClaudiuGeorgiu / Obfuscapk
An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modular architecture easily extensible with new techniques
☆1,090Updated last month
Related projects: ⓘ
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,010Updated last week
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,048Updated last year
- Detect Frida for Android☆668Updated 3 years ago
- Deobfuscator for Android Application☆395Updated 2 years ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,382Updated 3 years ago
- Android virtual machine and deobfuscator☆4,438Updated 2 years ago
- A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided relea…☆1,965Updated 10 months ago
- Android Reverse-Engineering Workbench for VS Code☆2,590Updated 4 months ago
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,216Updated 8 months ago
- Binary instrumentation framework based on FRIDA☆1,535Updated 2 weeks ago
- smalidea is a smali language plugin for IntelliJ IDEA☆643Updated last year
- Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as p…☆592Updated 5 months ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,574Updated this week
- A couple of methods for detecting Frida on Android.☆435Updated 2 years ago
- Quark Agent - Your AI-powered Android APK Analyst☆1,284Updated this week
- Recreate Java code from Smali☆490Updated last year
- Android Anti-Emulator☆785Updated 3 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,576Updated last year
- ☆920Updated 2 years ago
- Android API restriction bypass for all Android Versions☆624Updated 5 months ago
- Hand-crafted Frida examples☆2,249Updated 6 months ago
- A universal memory dumper using Frida☆726Updated last month
- A tool that helps you work with frida easily for Android platform☆423Updated last week
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆489Updated 5 years ago
- Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0☆1,112Updated 4 years ago
- Documentation:☆1,556Updated last year
- Dynamic analysis of Android apps☆756Updated last year
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆371Updated last year
- A framework for automated extraction of static and dynamic features from Android applications☆341Updated last year
- Ninja Reverse Engineering on Android APK packages☆267Updated 2 months ago