LaurieWired / JADXecuteLinks
JADX-gui scripting plugin for dynamic decompiler manipulation
☆699Updated last year
Alternatives and similar repositories for JADXecute
Users that are interested in JADXecute are comparing it to the libraries listed below
Sorting:
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆727Updated 3 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆571Updated last month
- The repo contains a series of challenges for learning Frida for Android Exploitation.☆1,177Updated last year
- Deobfuscator for Android Application☆465Updated 3 years ago
- The ARTful library for dynamically modifying the Android Runtime☆342Updated last year
- Automated Android custom unpacker generator☆373Updated 4 months ago
- Burp proxy flutter apps☆317Updated 6 months ago
- A tool that helps you work with frida easily for Android platform☆605Updated last year
- 🔓A Curated List Of Modern Android Exploitation Conference Talks.☆676Updated this week
- A Frida script that disables Flutter's TLS verification☆525Updated 7 months ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆185Updated last year
- Analysis scripts for Ghidra to work with Android NDK libraries.☆354Updated 2 years ago
- ☆568Updated last month
- Plugin for JADX to integrate MCP server☆915Updated this week
- Mobile Edge-Dynamic Unified Security Analysis☆2,145Updated this week
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- Flutter Reverse Engineering Framework☆1,429Updated 3 years ago
- ☆455Updated 5 months ago
- Generic Script To Bypass Some AntiFrida Checks☆528Updated last year
- Collection of useful FRIDA Mobile Scripts☆414Updated 4 years ago
- LLM tool to deobfuscate android app and find any potential vulnerabilities in android apps and code.☆291Updated last month
- Intentionally vulnerable Android application.☆340Updated 3 months ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆334Updated 2 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆650Updated 10 months ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,116Updated 2 years ago
- APK/DEX detector for Windows, Linux and MacOS.☆670Updated this week
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.☆349Updated last month
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆445Updated 3 weeks ago
- Script to quickly hook natives call to JNI in Android☆616Updated 2 years ago
- Property extractor for Android apps☆307Updated 9 months ago