Lukas-Dresel / ARTIST
The Android Runtime Instrumentation Toolkit
☆23Updated 8 years ago
Related projects: ⓘ
- Android OAT Plugin for JEB☆46Updated last year
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago
- ☆14Updated this week
- Android Injector☆23Updated 7 years ago
- AndroidSubstrate_hookingC_examples☆57Updated 9 years ago
- Parse and tamper DEX file☆17Updated 7 years ago
- ☆11Updated this week
- ☆39Updated 7 years ago
- ☆34Updated this week
- ☆92Updated this week
- JNI Helper Plugin☆52Updated 3 years ago
- ☆31Updated 8 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- A library for reading, manipulating, and writing dex (and odex) files.☆15Updated 11 years ago
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆45Updated 9 years ago
- ☆12Updated 7 years ago
- Extracting the strings from the .dex files with meaning.☆11Updated 6 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆45Updated 6 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆39Updated 6 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 8 years ago
- ☆22Updated this week
- Various Jeb plugins, including obfuscation restore☆15Updated 9 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆32Updated 8 years ago
- ElfHooK, reference with boyliang's AllHookInOne project, fix bugs, support android 5/6/7 and aarch64☆29Updated 2 years ago
- DEX bytecode instrumentation using dexlib2 from the smali project☆17Updated 9 years ago
- ☆37Updated this week
- JEB Scripts☆19Updated 9 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆85Updated 8 years ago
- ☆42Updated this week