LaurieWired / SmaliReferenceLinks
Smali reference for reverse engineering Dalvik Bytecode
☆40Updated 2 years ago
Alternatives and similar repositories for SmaliReference
Users that are interested in SmaliReference are comparing it to the libraries listed below
Sorting:
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆60Updated this week
- Run the Medusa Android framework inside a docker container on x86 or ARM☆39Updated 2 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- This contains notes and code for my Troopers23 Beyond Java talk☆23Updated 2 years ago
- This contains notes, slides, and code for my Strange Loop talk☆30Updated 2 years ago
- A list of bizarre crackmes☆143Updated 2 weeks ago
- This contains notes, slides, and code for my Infosec World talk☆17Updated 2 years ago
- ☆21Updated 2 years ago
- Slides and videos from my public speeches / conferences☆83Updated last week
- A guide to choosing between different Android Emulator options for Reverse Engineers☆121Updated 3 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆191Updated last year
- A burp for intents wannabe☆78Updated last year
- Contains all the scripts and sample apps related to android in app protections.☆40Updated 2 months ago
- This contains notes and slides for my Objective by the Sea talk☆97Updated 2 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- ☆95Updated 3 years ago
- Extracting unpacked dec files from running application using frida.☆45Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆93Updated last year
- Dynamic injection tool for Linux/Android☆197Updated last year
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆42Updated 3 years ago
- Type diagram plugin for JADX decompiler☆74Updated last month
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆160Updated 2 years ago
- Detect code obfuscation through text classification in the detection process.☆45Updated 2 years ago
- Inspect and instrument React Native applications at runtime☆108Updated last year
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆122Updated 2 years ago
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malware☆29Updated last year
- Real Android malware apps discussed in the book☆45Updated 2 years ago
- AI tool to deobfuscate and find any potential vulnerabilities in android apps.☆315Updated last week
- Significant security enchancements of recent major Android versions.☆184Updated 7 months ago
- The ARTful library for dynamically modifying the Android Runtime☆344Updated last year