Storyyeller / enjarify
☆932Updated 3 years ago
Alternatives and similar repositories for enjarify:
Users that are interested in enjarify are comparing it to the libraries listed below
- Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0☆1,142Updated 5 years ago
- ☆2,735Updated 5 years ago
- A plugin for IntelliJ IDEA & Android Studio to easily compile Java & Kotlin files to smali.☆499Updated 4 years ago
- Android dynamic instrumentation framework☆767Updated 5 years ago
- Android Anti-Emulator☆813Updated 4 years ago
- smalidea is a smali language plugin for IntelliJ IDEA☆673Updated 2 years ago
- Android virtual machine and deobfuscator☆4,536Updated 3 years ago
- Android Debugging Library☆597Updated 8 years ago
- Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)☆2,883Updated 4 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆497Updated 6 years ago
- Tool to decompile & extract Android Dex bytecode from Vdex files☆1,062Updated 9 months ago
- Android application hooking tool based on VirtualApp☆764Updated 5 years ago
- Recreate Java code from Smali☆523Updated 2 years ago
- Lets you hook Method Calls in Frida ( Android )☆391Updated 5 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,198Updated this week
- Android app dynamic reverse tool based on Xposed framework.☆1,014Updated 10 years ago
- Yet Another Hook Framework for ART☆1,606Updated 9 months ago
- Android Dynamic Binary Instrumentation Toolkit☆1,262Updated 7 years ago
- Documentation:☆1,590Updated 2 years ago
- Unofficial dex2jar builds☆214Updated 5 years ago
- smali/baksmali☆6,448Updated last year
- A framework for hook java methods.☆1,605Updated 2 years ago
- General Automatic Unpacking Tool for Android Dex Files☆1,334Updated 8 years ago
- An Xposed and adbi based module which is capable of hooking both Java and Native methods targeting Android OS.☆476Updated 8 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,704Updated last year
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,324Updated last year
- thumb16 thumb32 arm32 inlineHook in Android☆1,372Updated 4 years ago
- The second generation Android Hardening Protection☆397Updated 6 years ago
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆827Updated 8 years ago
- ☆1,030Updated last year