LaurieWired / JADXecuteLinks
JADX-gui scripting plugin for dynamic decompiler manipulation
☆669Updated last year
Alternatives and similar repositories for JADXecute
Users that are interested in JADXecute are comparing it to the libraries listed below
Sorting:
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆544Updated this week
- Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".☆678Updated 10 months ago
- The repo contains a series of challenges for learning Frida for Android Exploitation.☆1,066Updated 10 months ago
- Plugin for JADX to integrate MCP server☆336Updated last month
- A tool that helps you work with frida easily for Android platform☆553Updated 7 months ago
- Binary instrumentation framework based on FRIDA☆1,965Updated this week
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆352Updated last year
- Collection of useful FRIDA Mobile Scripts☆411Updated 3 years ago
- Deobfuscator for Android Application☆438Updated 3 years ago
- ☆487Updated last month
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆646Updated last year
- The ARTful library for dynamically modifying the Android Runtime☆338Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆311Updated 2 years ago
- Script to quickly hook natives call to JNI in Android☆575Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆172Updated last year
- 🔓A curated list of modern Android exploitation conference talks.☆520Updated 2 weeks ago
- Generic Script To Bypass Some AntiFrida Checks☆495Updated 9 months ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,100Updated 2 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆615Updated 4 months ago
- Burp proxy flutter apps