Lukas-Dresel / ARTISTView external linksLinks
The Android Runtime Instrumentation Toolkit
☆25Aug 20, 2016Updated 9 years ago
Alternatives and similar repositories for ARTIST
Users that are interested in ARTIST are comparing it to the libraries listed below
Sorting:
- A runtime patching library for Android.☆20Apr 13, 2017Updated 8 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Feb 5, 2017Updated 9 years ago
- Android runtime jit binary file parser☆13Dec 20, 2017Updated 8 years ago
- zygote hook for art in android 6.0 and more☆54Sep 12, 2017Updated 8 years ago
- BSPatch Java implement with android (based on bspatch by Joe Desbonnet, joe@galway.net (JBPatch))☆10Nov 25, 2016Updated 9 years ago
- ida for android☆26May 15, 2017Updated 8 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆47Oct 18, 2017Updated 8 years ago
- Highly simplified Java and Davlk virtual machine implementations☆23Mar 3, 2014Updated 11 years ago
- 基于YAHFA和dexposed 结合的hook框架 支持4.0-7.0☆88Jul 1, 2017Updated 8 years ago
- LD_PRELOAD magic for Android's AssetManager☆82Jun 6, 2022Updated 3 years ago
- Data Flow Analysis and Static Single Assignment☆29Apr 12, 2018Updated 7 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Oct 1, 2021Updated 4 years ago
- ☆27Oct 21, 2016Updated 9 years ago
- DroidPlugin and Atlas practise samples to know them well☆14Apr 26, 2020Updated 5 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- Little Kernel for Hyper-V arm64 Guest☆31Jan 23, 2022Updated 4 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆74May 10, 2019Updated 6 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆77Aug 21, 2015Updated 10 years ago
- ☆32Apr 22, 2019Updated 6 years ago
- xposed for ART☆15Nov 21, 2014Updated 11 years ago
- Android File Fuzzing Framework☆87Jun 7, 2022Updated 3 years ago
- 隐藏关键方法的相关调用☆57Apr 28, 2017Updated 8 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆33Mar 5, 2018Updated 7 years ago
- Recover control flow graph from obfuscated codes☆37Jul 18, 2015Updated 10 years ago
- ☆13Feb 23, 2016Updated 9 years ago
- A C compiler with SSA-based backend optimzation☆15Mar 19, 2016Updated 9 years ago
- ARM virtual machine☆41Feb 10, 2018Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- A JIT assembler from JavascriptCore☆39Feb 14, 2017Updated 9 years ago
- ☆75May 15, 2019Updated 6 years ago
- ☆34Jan 9, 2022Updated 4 years ago
- Extended oatdump from AOSP platform/art repo☆137Oct 14, 2017Updated 8 years ago
- arm code manipulation☆20Apr 20, 2015Updated 10 years ago
- A SDK for the creation of analysis tools without obtaining app source code in order to profile runtime performance, examine code coverage…☆202Dec 16, 2018Updated 7 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- Extract the part of JavaHook in the Xposed. Usage: Inject one process to load libtest.so, then enter the Java world and hook the java fun…☆26Jul 23, 2015Updated 10 years ago
- Android Injector☆23Dec 1, 2016Updated 9 years ago
- An ugly hack to do something, like start an intent, while being uninstalled by the system☆23Mar 29, 2017Updated 8 years ago