CodeMason / JavaSnoop
☆22Updated 7 years ago
Related projects: ⓘ
- Automatically exported from code.google.com/p/javasnoop☆27Updated 9 years ago
- ☆45Updated 7 years ago
- Android Library Code Recognition☆77Updated 4 months ago
- Java integration for Hex-Rays IDA Pro☆26Updated 7 years ago
- Mobile security trainings based on android☆102Updated 3 years ago
- A smali emulator.☆23Updated 6 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆21Updated last year
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆93Updated 7 years ago
- Frida FDE bruteforce Samsung S7 Edge☆46Updated 4 years ago
- Official Dexcalibur documentation☆15Updated 3 years ago
- ☆19Updated 5 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 6 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- ☆28Updated 6 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 6 years ago
- The pyspresso package is a Python-based framework for debugging Java.☆51Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- BSides Munich Frida Workshop 2018☆48Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆51Updated 5 years ago
- [Digital Whisper] Reverse Engineering Automation Article - Source Codes☆62Updated last year
- Android privilege escalation via an use-after-free in binder.c☆37Updated 4 years ago
- Android Dex disassembler and Binary Ninja plugin☆52Updated 4 months ago
- Android Unpacking Automation using Corellium Devices☆130Updated 4 years ago
- Android Hacking Event 2017 Write-up☆44Updated 7 years ago
- All You Need For Ida Pro And Android Debugging☆62Updated 9 years ago
- A tool pulls loaded binaries ordered by memory regions☆33Updated 4 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆86Updated 7 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆129Updated 8 years ago