LaurieWired / ARTful
The ARTful library for dynamically modifying the Android Runtime
☆330Updated last year
Alternatives and similar repositories for ARTful:
Users that are interested in ARTful are comparing it to the libraries listed below
- Automated Android custom unpacker generator☆329Updated 9 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆530Updated this week
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆54Updated last year
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆651Updated 8 months ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆98Updated 2 years ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆651Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆36Updated last year
- This contains notes and slides for my Objective by the Sea talk☆98Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆168Updated last year
- 🔓A curated list of modern Android exploitation conference talks.☆507Updated last month
- Run the Medusa Android framework inside a docker container on x86 or ARM☆34Updated 2 years ago
- Code Coverage Exploration Plugin for Ghidra☆348Updated 9 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆491Updated 11 months ago
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆29Updated 9 months ago
- A list of bizarre crackmes☆110Updated last month
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆620Updated last month
- Significant security enchancements of recent major Android versions.☆172Updated last month
- This contains notes, slides, and code for my Strange Loop talk☆32Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆143Updated last year
- An LLM extension for Ghidra to enable AI assistance in RE.☆185Updated 2 weeks ago
- Docker container for quickly analyzing Linux malware☆74Updated last year
- Notes for my video on running an ARM64 Android emulator in Azure☆41Updated 9 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆243Updated last year
- Brings the power of ChatGPT to Ghidra!☆134Updated 8 months ago
- Turn binaries into music☆53Updated 11 months ago
- This contains notes, slides, and code for my Infosec World talk☆20Updated last year
- A Pythonic Ghidra standard library☆166Updated this week
- local language model for radare2☆259Updated this week
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆343Updated last year
- This contains notes and code for my Troopers23 Beyond Java talk☆27Updated last year