Guardsquare / flutter-re-demoLinks
Experiments on the feasibility of Flutter application reverse engineering
☆168Updated 2 years ago
Alternatives and similar repositories for flutter-re-demo
Users that are interested in flutter-re-demo are comparing it to the libraries listed below
Sorting:
- Dart / Flutter VM snapshot analyzer☆339Updated 4 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆105Updated 3 years ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆176Updated last year
- IDA Frida Plugin for tracing something interesting.☆346Updated 3 months ago
- Engine used by jnitrace to intercept JNI API calls.☆330Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆212Updated 2 months ago
- A dynamic dex dumper, implemented in rust, no frida.☆152Updated 2 years ago
- Stealth patch for Frida, stealth knowledge collection☆115Updated last year
- Files used to resolve the r2pay challenge☆55Updated 5 years ago
- Instructions tracing powered by frida☆182Updated 6 years ago
- Analysis and proof-of-concept bypass of Promon SHIELD's Android application protection☆189Updated 2 years ago
- jni.h compiled for Ghidra☆92Updated 5 years ago
- Analysis scripts for Ghidra to work with Android NDK libraries.☆358Updated 3 years ago
- Public researchings of the Google's Android apps protection☆376Updated 6 months ago
- Non-authoritatively making Frida less (not un-!)detectable by applying some symptomatic patches. Melded with CrackerCat/strongR-frida-and…☆186Updated last week
- All-in-one android application protection☆254Updated 11 months ago
- ☆162Updated 6 years ago
- Trace APIs declaratively through Frida.☆233Updated 7 months ago
- Deobfuscator for Android Application☆469Updated 3 years ago
- Zygisk-based reFlutter☆134Updated 8 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆161Updated 2 years ago
- Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode)☆47Updated 4 years ago
- Script to quickly hook natives call to JNI in Android☆622Updated 2 years ago
- Forked from fbongtrop/hbctool☆115Updated 2 years ago
- android memory access trace utility powered by frida framework☆246Updated 3 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆660Updated 11 months ago
- Example showing how to use Frida for standalone injection of a custom payload☆164Updated 5 years ago
- Dump Memory of Process in Android☆321Updated 4 years ago
- BUILT VERSION OF FRIDA FOR THE FRIDA ART ISSUE☆16Updated last year