DarioI / droidgraphLinks
Create different graphs from Android DEX bytecode to get insight in the code structure.
☆19Updated 4 years ago
Alternatives and similar repositories for droidgraph
Users that are interested in droidgraph are comparing it to the libraries listed below
Sorting:
- This application attempts to detect android overlay attacks☆44Updated last year
- An ugly hack to do something, like start an intent, while being uninstalled by the system☆23Updated 8 years ago
- Advanced detection of rooting☆74Updated 9 years ago
- A simple demo app that demonstrates Certificate pinning and scheme/domain whitelisting in Android WebViews☆105Updated 6 years ago
- Tamper detection in Android☆90Updated 4 years ago
- A set of building blocks for analyzing Android apps with Atlas☆14Updated 2 years ago
- Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header☆72Updated 12 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆32Updated 7 years ago
- A Program Analysis Toolkit for Android☆118Updated 8 years ago
- DEX bytecode instrumentation using dexlib2 from the smali project☆19Updated 9 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Extract both control flow graphs and code parts from APK based on API calls.☆19Updated 2 years ago
- The Redexer binary instrumentation framework for Dalvik bytecode☆166Updated 4 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- A set of techniques to protect against overlays on Android☆29Updated last year
- Detecting repackaged magisk in less than a second☆22Updated 5 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆79Updated 8 years ago
- JDB++ an jdb extension for easily debugging through smali code☆23Updated 4 years ago
- ☆169Updated 3 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- Diff between two APK files.☆128Updated 2 years ago
- PoC framework for APK obfuscation☆52Updated 9 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- An overlay attack example☆27Updated 7 years ago
- ARES: Android Reverse Engineering Suite is a security suite for analyzing Android .apk files.☆31Updated 8 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- A very rudimentary Android DEX file parser☆66Updated 10 years ago
- ACVTool (Android Code Coverage Tool) is a tool to measure fine-grained code coverage of 3rd-party Android apps.☆124Updated 2 weeks ago
- Android load custom dex file☆13Updated 10 years ago