DarioI / droidgraphLinks
Create different graphs from Android DEX bytecode to get insight in the code structure.
☆19Updated 4 years ago
Alternatives and similar repositories for droidgraph
Users that are interested in droidgraph are comparing it to the libraries listed below
Sorting:
- This application attempts to detect android overlay attacks☆44Updated 2 years ago
- An ugly hack to do something, like start an intent, while being uninstalled by the system☆23Updated 8 years ago
- A Program Analysis Toolkit for Android☆118Updated 8 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆33Updated 7 years ago
- A simple demo app that demonstrates Certificate pinning and scheme/domain whitelisting in Android WebViews☆105Updated 7 years ago
- Advanced detection of rooting☆74Updated 9 years ago
- A set of building blocks for analyzing Android apps with Atlas☆14Updated 2 years ago
- Tamper detection in Android☆90Updated 4 years ago
- The Redexer binary instrumentation framework for Dalvik bytecode☆167Updated 4 years ago
- A native root checker for Android devices and sample app☆129Updated 3 years ago
- Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header☆72Updated 12 years ago
- Loading apks or classes without reinstalling your app.☆152Updated 4 years ago
- ARES: Android Reverse Engineering Suite is a security suite for analyzing Android .apk files.☆31Updated 8 years ago
- Wiki pages about Android internals☆33Updated 12 years ago
- Android load custom dex file☆13Updated 10 years ago
- Diff between two APK files.☆130Updated 2 years ago
- DEX bytecode instrumentation using dexlib2 from the smali project☆19Updated 10 years ago
- Prints the Kotlin metadata attached to Java class files☆59Updated this week
- Collection of platform headers and link libs for all versions of Android. (repo is rebased, see wiki)☆59Updated 9 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- Sample that demonstrates dynamic code loading from dex files over the network☆17Updated 9 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆78Updated 9 years ago
- AAMO: Another Android Malware Obfuscator☆124Updated 9 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆89Updated 7 years ago
- LibScout: Third-party library detector for Java/Android apps☆295Updated 5 years ago
- Android library to reveal or obfuscate strings and assets at runtime☆256Updated 4 years ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Updated 3 years ago
- ☆173Updated 3 years ago
- Detecting repackaged magisk in less than a second☆22Updated 6 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago