ThexXTURBOXx / dex2jarLinks
Tools to work with android .dex and java .class files
β268Updated 2 months ago
Alternatives and similar repositories for dex2jar
Users that are interested in dex2jar are comparing it to the libraries listed below
Sorting:
- π AOT compiler to translate dalvikvm code into cpp codeβ290Updated 2 weeks ago
- Public researchings of the Google's Android apps protectionβ330Updated 2 months ago
- Bypass APK Signatures Verify & Integrity Check using Reflectionβ403Updated last year
- Modify Android linker to provide loading module and hook functionβ451Updated 2 weeks ago
- A android app for encrypting apkβ194Updated 4 years ago
- dProtect is a Proguard-based obfuscator for Java and Kotlinβ363Updated 2 years ago
- β321Updated 6 months ago
- Dump Memory of Process in Androidβ309Updated 4 years ago
- Is a protect Android App anti any attacks and environments.β350Updated last year
- This project is an graphical utility based on BlackObfuscator.β154Updated 3 years ago
- Inject frida agents on local processes through an Android appβ271Updated 4 years ago
- make it possible to run method of android-app with original Java Virtual Machine.β253Updated 8 months ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.β149Updated 7 months ago
- Engine used by jnitrace to intercept JNI API calls.β326Updated 2 years ago
- A dynamic dex dumper, implemented in rust, no frida.β146Updated 2 years ago
- This is a tool used to modify Android Manifest binary file.β394Updated 7 months ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuildingβ464Updated 5 years ago
- Run a more undetectable frida server on boot using magisk πββ272Updated 2 months ago
- Java Xposed Api for LSPlantβ214Updated last month
- https://5ec1cff.github.io/my-blogβ325Updated 2 years ago
- Android ε εΊεΊη¨HookζΉεΌ-Fridaβ290Updated 3 years ago
- β378Updated 7 months ago
- Android Memory Editor/Scanner (MemoryTools)β228Updated 9 months ago
- toggle app debuggableβ366Updated 9 months ago
- Non-authoritatively making Frida less (not un-!)detectable by applying some symptomatic patches. Melded with CrackerCat/strongR-frida-andβ¦β151Updated this week
- Android binary resources read/write libraryβ327Updated last month
- Find JNI function signatures in APK and apply to reverse-engineering tools.β641Updated 8 months ago
- ε©η¨ frida θ·ε Jni RegisterNatives ε¨ζ注εηε½ζ°β345Updated 2 years ago
- An android Dex protection shell implementationβ807Updated this week
- Jnitrace for cppβ298Updated last year