FrenchYeti / dexcalibur-doc
Official Dexcalibur documentation
☆16Updated 3 years ago
Alternatives and similar repositories for dexcalibur-doc:
Users that are interested in dexcalibur-doc are comparing it to the libraries listed below
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- My own collection of Frida scripts and tricks☆68Updated 3 years ago
- ☆32Updated 5 years ago
- ☆76Updated 3 weeks ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- ☆30Updated last year
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- ☆17Updated 5 years ago
- ☆30Updated 4 months ago
- ☆45Updated 7 years ago
- A place to reborn☆59Updated 2 years ago
- ☆27Updated last year
- ☆55Updated 2 months ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- Worst Android kernel fuzzer☆45Updated 4 years ago
- Android Malware Tracker☆28Updated 11 months ago
- ☆102Updated 4 years ago
- ☆29Updated 3 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆66Updated 5 years ago
- ☆21Updated last year
- Android application tracer powered by Frida☆78Updated 4 years ago
- The slides from my Saintcon 2019 talk.☆48Updated 5 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- ☆34Updated 3 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- Frida (Android) Script for extracting bluetooth information☆60Updated last year
- you can use frida in jeb !☆46Updated 2 years ago