LaurieWired / ARTfulLinks
The ARTful library for dynamically modifying the Android Runtime
☆338Updated last year
Alternatives and similar repositories for ARTful
Users that are interested in ARTful are comparing it to the libraries listed below
Sorting:
- Automated Android custom unpacker generator☆333Updated 11 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆544Updated this week
- A guide to choosing between different Android Emulator options for Reverse Engineers☆100Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆55Updated last year
- JADX-gui scripting plugin for dynamic decompiler manipulation☆669Updated last year
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆678Updated 10 months ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆172Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆38Updated last year
- 🔓A curated list of modern Android exploitation conference talks.☆520Updated 2 weeks ago
- A list of bizarre crackmes☆118Updated 2 weeks ago
- This contains notes and slides for my Objective by the Sea talk☆99Updated last year
- Android 14 kernel exploit for Pixel7/8 Pro☆508Updated last year
- Notes for my video on running an ARM64 Android emulator in Azure☆41Updated 11 months ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆38Updated 2 years ago
- Code Coverage Exploration Plugin for Ghidra☆355Updated 11 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆30Updated 11 months ago
- Significant security enchancements of recent major Android versions.☆175Updated last week
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆628Updated 3 months ago
- Slides and videos from my public speeches / conferences☆75Updated 3 weeks ago
- LLM tool to find any potential vulnerabilities in android apps and deobfuscate android app code.☆128Updated this week
- A burp for intents wannabe☆67Updated 10 months ago
- Supporting code and apps for demonstrating Android interprocess communication☆41Updated 10 months ago
- Brings the power of ChatGPT to Ghidra!☆153Updated 10 months ago
- The iOS IPA file Reverse Engineering reference☆381Updated last year
- Docker container for quickly analyzing Linux malware☆77Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆252Updated 2 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆352Updated last year
- Statically unpacking common android banker malware.☆149Updated 2 months ago
- Slides & Hands-on for the reverse engineering workshop☆179Updated 2 years ago