LaurieWired / JADXecuteLinks
JADX-gui scripting plugin for dynamic decompiler manipulation
☆697Updated last year
Alternatives and similar repositories for JADXecute
Users that are interested in JADXecute are comparing it to the libraries listed below
Sorting:
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆715Updated last month
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆565Updated 4 months ago
- The repo contains a series of challenges for learning Frida for Android Exploitation.☆1,134Updated last year
- Plugin for JADX to integrate MCP server☆591Updated this week
- Analysis scripts for Ghidra to work with Android NDK libraries.☆349Updated 2 years ago
- Binary instrumentation framework based on FRIDA☆2,077Updated last week
- Deobfuscator for Android Application☆456Updated 3 years ago
- A tool that helps you work with frida easily for Android platform☆590Updated 11 months ago
- The ARTful library for dynamically modifying the Android Runtime☆340Updated last year
- Automated Android custom unpacker generator☆363Updated 2 months ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆180Updated last year
- A Frida script that disables Flutter's TLS verification☆498Updated 5 months ago
- 🔓A Curated List Of Modern Android Exploitation Conference Talks.☆554Updated last week
- ☆533Updated 5 months ago
- ☆446Updated 3 months ago
- Generic Script To Bypass Some AntiFrida Checks☆522Updated last year
- Burp proxy flutter apps☆281Updated 4 months ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆329Updated 2 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆354Updated 2 years ago
- Collection of useful FRIDA Mobile Scripts☆171Updated 2 weeks ago
- A Collection of Android (Samsung) Security Research References☆448Updated 3 months ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆637Updated 8 months ago
- Script to quickly hook natives call to JNI in Android☆598Updated 2 years ago
- Collection of useful FRIDA Mobile Scripts☆414Updated 4 years ago
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆422Updated 3 weeks ago
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆771Updated last week
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆331Updated last month
- A guide to choosing between different Android Emulator options for Reverse Engineers☆114Updated 2 years ago
- Flutter Reverse Engineering Framework☆1,416Updated 3 years ago
- Intentionally vulnerable Android application.☆311Updated last month