MarginResearch / dalvikLinks
Dalvik bytecode disassembler and graph view
☆67Updated last year
Alternatives and similar repositories for dalvik
Users that are interested in dalvik are comparing it to the libraries listed below
Sorting:
- breaking decompilers☆52Updated 4 months ago
- Rust ADB client - Mirror of https://github.com/cocool97/adb_client☆22Updated 2 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆90Updated last year
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Updated 6 months ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆46Updated 3 years ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆165Updated 2 months ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆68Updated this week
- PoC associated to the talk "Attacking Samsung Galaxy A* Boot Chain" (https://www.blackhat.com/us-24/briefings/schedule/#attacking-samsung…☆73Updated last year
- Recover compile-units from stripped binary executables☆49Updated 6 months ago
- Frida hook generator for Ghidra☆127Updated 2 weeks ago
- ☆74Updated 9 months ago
- Repository for a library focused on binary analysis (mainly for Java related bytecodes)☆44Updated this week
- Proof-of-concept code for Android APEX key reuse vulnerability☆100Updated last year
- ☆47Updated 11 months ago
- Type diagram plugin for JADX decompiler☆66Updated 3 weeks ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆180Updated last year
- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.☆64Updated this week
- A Rust crate to load a shared library into a Linux process without using ptrace.☆139Updated 2 years ago
- A binary analysis framework written in Rust.☆168Updated 2 months ago
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- ☆77Updated last year
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆21Updated 6 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆78Updated this week
- Tantō slices functions into more consumable chunks☆71Updated 5 months ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆33Updated 3 years ago
- Frida plugin for Binary Ninja☆18Updated 8 months ago
- ☆61Updated last year
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- Xyntia, the black-box deobfuscator☆75Updated 3 months ago
- simple type recognition in decompiled executables☆113Updated last year