ThexXTURBOXx / dex2jarLinks
Tools to work with android .dex and java .class files
β271Updated 3 weeks ago
Alternatives and similar repositories for dex2jar
Users that are interested in dex2jar are comparing it to the libraries listed below
Sorting:
- π AOT compiler to translate dalvikvm code into cpp codeβ307Updated 2 weeks ago
- β341Updated 9 months ago
- Is a protect Android App anti any attacks and environments.β355Updated 2 years ago
- make it possible to run method of android-app with original Java Virtual Machine.β255Updated 11 months ago
- This project is an graphical utility based on BlackObfuscator.β158Updated 3 years ago
- toggle app debuggableβ379Updated last year
- https://5ec1cff.github.io/my-blogβ336Updated 2 years ago
- dProtect is a Proguard-based obfuscator for Java and Kotlinβ381Updated 2 years ago
- Modify Android linker to provide loading module and hook functionβ460Updated 3 months ago
- Engine used by jnitrace to intercept JNI API calls.β330Updated 2 years ago
- This is a tool used to modify Android Manifest binary file.β398Updated last month
- Bypass APK Signatures Verify & Integrity Check using Reflectionβ413Updated last year
- Java Xposed Api for LSPlantβ233Updated 4 months ago
- Java runtime interop from Fridaβ394Updated this week
- encode xml to axml AND decode axml to xml--Hack Android Manifest easilyβ284Updated 3 years ago
- A dynamic dex dumper, implemented in rust, no frida.β152Updated 2 years ago
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.β157Updated 2 months ago
- Inject frida agents on local processes through an Android appβ272Updated 4 years ago
- Public researchings of the Google's Android apps protectionβ375Updated 5 months ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.β213Updated 2 years ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuildingβ473Updated 5 years ago
- Android ε εΊεΊη¨HookζΉεΌ-Fridaβ289Updated 3 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.β657Updated 10 months ago
- a next-generation hooking and reflection framework built for performance, safety, and extensibility.β268Updated 3 weeks ago
- Jnitrace for cppβ306Updated last year
- Dump Memory of Process in Androidβ317Updated 4 years ago
- A binder interceptor framework for Androidβ367Updated last year
- Automated tool for patching APKs to enable the use of Frida gadget by downloading the library and injecting code into the main activity.β361Updated last week
- A android app for encrypting apkβ195Updated 4 years ago
- Android binary resources read/write libraryβ347Updated last month