Automated Android custom unpacker generator
☆375Aug 23, 2025Updated 6 months ago
Alternatives and similar repositories for BadUnboxing
Users that are interested in BadUnboxing are comparing it to the libraries listed below
Sorting:
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆30Jun 29, 2024Updated last year
- Smali reference for reverse engineering Dalvik Bytecode☆41Sep 6, 2023Updated 2 years ago
- Supporting code and apps for demonstrating Android interprocess communication☆43Aug 5, 2024Updated last year
- The ARTful library for dynamically modifying the Android Runtime☆346Apr 6, 2024Updated last year
- This contains notes, slides, and code for my Strange Loop talk☆31Sep 22, 2023Updated 2 years ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆124Feb 7, 2023Updated 3 years ago
- ☆20Aug 12, 2023Updated 2 years ago
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆12May 25, 2023Updated 2 years ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Mar 27, 2022Updated 3 years ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆64Feb 6, 2026Updated last month
- ☆38Oct 24, 2023Updated 2 years ago
- This contains notes, slides, and code for my Infosec World talk☆18Sep 26, 2023Updated 2 years ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆719Feb 5, 2024Updated 2 years ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13May 31, 2023Updated 2 years ago
- This contains notes and code for my Troopers23 Beyond Java talk☆24Jun 30, 2023Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆40Mar 19, 2023Updated 2 years ago
- iOS and macOS Decompiler☆2,671Aug 26, 2025Updated 6 months ago
- Mobile Edge-Dynamic Unified Security Analysis☆2,192Feb 26, 2026Updated last week
- Repository of algorithms implemented in pure assembly☆286Jun 12, 2024Updated last year
- The iOS IPA file Reverse Engineering reference☆499Jan 29, 2024Updated 2 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆39Jul 19, 2024Updated last year
- Turn binaries into music☆63May 17, 2024Updated last year
- A burp for intents wannabe☆79Jul 29, 2024Updated last year
- .wav files of various oscilliscope graphics tests☆16Aug 7, 2023Updated 2 years ago
- Docker container for quickly analyzing Linux malware☆86Aug 20, 2023Updated 2 years ago
- 🔓A Curated List Of Modern Android Exploitation Conference Talks.☆711Updated this week
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- A list of bizarre crackmes☆145Updated this week
- Bytecode Analysis Toolkit.☆17Oct 28, 2022Updated 3 years ago
- ☆113Oct 1, 2024Updated last year
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆330Jul 29, 2024Updated last year
- This contains notes and slides for my Objective by the Sea talk☆98Oct 14, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Notes and slides for my 2024 Objective by the Sea talk on iOS decompilation☆36Dec 17, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- ☆10Oct 1, 2023Updated 2 years ago
- DroidGuard VM Samples☆67May 8, 2022Updated 3 years ago