MatrixEditor / pysmaliLinks
Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.
☆26Updated 5 months ago
Alternatives and similar repositories for pysmali
Users that are interested in pysmali are comparing it to the libraries listed below
Sorting:
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆55Updated last week
- App for learnfrida.info☆20Updated 3 years ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆20Updated 3 years ago
- ☆56Updated 2 years ago
- ☆32Updated 3 years ago
- Update Frida hooks automatically.☆27Updated 2 years ago
- Getting better stacks and backtraces in Frida☆54Updated 2 months ago
- APatch KernelPatch QEMU Debug Environment☆20Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆23Updated last year
- Easy-to-use Android library for tampering detection, with a sample app included☆61Updated 7 months ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆25Updated 10 months ago
- Root takeover via signature spoofing in KernelSU☆18Updated 2 years ago
- DroidGuard VM Samples☆64Updated 3 years ago
- Frida module utils, writen in typescript☆15Updated last year
- ☆41Updated 3 months ago
- Android Overlay Hijack☆28Updated last year
- ☆57Updated 8 months ago
- Small Apps As PoC to Detect Frida With Frida☆53Updated 3 years ago
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Updated 2 years ago
- Run command with specific selinux context for Android☆25Updated 3 years ago
- Android-Syscall-Logger☆21Updated 4 years ago
- Deploy your own AOSPXRef☆26Updated 9 months ago
- Research on the internal workings of Google's Play Integrity Protect Virtual Machine (VM) with tools for both disassembling and decompili…☆159Updated 9 months ago
- A small script to get syscall info from its number (intented to be used with Frida)☆20Updated 4 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆59Updated 5 years ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 3 months ago
- A c++ (jni) implementation of KeyAttestation for Android☆29Updated last year
- ARM64 Assembly Code and Memory Simulator☆34Updated last year
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated 2 years ago
- Run `strace` on program that is under another debugger☆18Updated 2 years ago