LaurieWired / Azure_ARM64_Android_Emulator_NotesLinks
Notes for my video on running an ARM64 Android emulator in Azure
☆36Updated last year
Alternatives and similar repositories for Azure_ARM64_Android_Emulator_Notes
Users that are interested in Azure_ARM64_Android_Emulator_Notes are comparing it to the libraries listed below
Sorting:
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆37Updated 2 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆51Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆37Updated last year
- A guide to choosing between different Android Emulator options for Reverse Engineers☆102Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆89Updated last year
- ☆17Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆178Updated last year
- This contains notes, slides, and code for my Infosec World talk☆15Updated last year
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆10Updated 2 years ago
- A list of bizarre crackmes☆121Updated last month
- Some Of Anti-Frida Stuff☆126Updated 3 years ago
- Frida hook generator for Ghidra☆123Updated 2 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆12Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆97Updated last year
- ☆59Updated last year
- ☆90Updated 3 years ago
- Contains all the scripts and sample apps related to android in app protections.☆33Updated last year
- Type diagram plugin for JADX decompiler☆65Updated 5 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated last year
- Slides and videos from my public speeches / conferences☆76Updated 2 months ago
- Inspect and instrument React Native applications at runtime☆66Updated 8 months ago
- My talks and papers☆37Updated last month
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆26Updated last year
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- Miscellaneous code☆110Updated last month
- Dynamic injection tool for Linux/Android☆166Updated 7 months ago
- ☆46Updated 9 months ago
- The ARTful library for dynamically modifying the Android Runtime☆338Updated last year