LaurieWired / ARTfulLinks
The ARTful library for dynamically modifying the Android Runtime
☆344Updated last year
Alternatives and similar repositories for ARTful
Users that are interested in ARTful are comparing it to the libraries listed below
Sorting:
- Automated Android custom unpacker generator☆374Updated 4 months ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆120Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆59Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆190Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆574Updated 2 months ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆707Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆39Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆38Updated 2 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆11Updated 2 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆533Updated last year
- This contains notes and slides for my Objective by the Sea talk☆97Updated 2 years ago
- Significant security enchancements of recent major Android versions.☆184Updated 6 months ago
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆732Updated 4 months ago
- 🔓A Curated List Of Modern Android Exploitation Conference Talks.☆692Updated last week
- A list of bizarre crackmes☆136Updated last week
- Dynamic injection tool for Linux/Android☆195Updated last year
- Slides and videos from my public speeches / conferences☆80Updated last week
- This contains notes and code for my Troopers23 Beyond Java talk☆23Updated 2 years ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆649Updated 10 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆161Updated 2 years ago
- AI tool to deobfuscate and find any potential vulnerabilities in android apps.☆303Updated this week
- LLM-based reversing for radare2☆363Updated 2 weeks ago
- Statically unpacking common android banker malware.☆161Updated 9 months ago
- This contains notes, slides, and code for my Infosec World talk☆17Updated 2 years ago
- Supporting code and apps for demonstrating Android interprocess communication☆42Updated last year
- Workshop on firmware reverse engineering☆355Updated 3 months ago
- This contains notes, slides, and code for my Strange Loop talk☆30Updated 2 years ago
- Docker container for quickly analyzing Linux malware☆83Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year