ThexXTURBOXx / dex2jarLinks
Tools to work with android .dex and java .class files
β265Updated last week
Alternatives and similar repositories for dex2jar
Users that are interested in dex2jar are comparing it to the libraries listed below
Sorting:
- π AOT compiler to translate dalvikvm code into cpp codeβ274Updated 2 weeks ago
- Bypass APK Signatures Verify & Integrity Check using Reflectionβ382Updated 11 months ago
- This is a tool used to modify Android Manifest binary file.β384Updated 4 months ago
- Java Xposed Api for LSPlantβ192Updated 2 weeks ago
- β298Updated 4 months ago
- make it possible to run method of android-app with original Java Virtual Machine.β249Updated 6 months ago
- Is a protect Android App anti any attacks and environments.β346Updated last year
- This project is an graphical utility based on BlackObfuscator.β153Updated 3 years ago
- dProtect is a Proguard-based obfuscator for Java and Kotlinβ351Updated 2 years ago
- Modify Android linker to provide loading module and hook functionβ434Updated 2 months ago
- https://5ec1cff.github.io/my-blogβ324Updated last year
- encode xml to axml AND decode axml to xml--Hack Android Manifest easilyβ281Updated 3 years ago
- A android app for encrypting apkβ193Updated 4 years ago
- Android binary resources read/write libraryβ306Updated 2 weeks ago
- toggle app debuggableβ347Updated 6 months ago
- Public researchings of the Google's Android apps protectionβ278Updated this week
- This is a dynamic instrumentation tool that can inject xposed module into any appliation on rooted Android devices.β141Updated 4 months ago
- Java runtime interop from Fridaβ367Updated last week
- A dynamic dex dumper, implemented in rust, no frida.β140Updated 2 years ago
- Dump Memory of Process in Androidβ305Updated 4 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.β624Updated 5 months ago
- π€ xml2axml & axml2xmlβ66Updated last year
- Android Memory Editor/Scanner (MemoryTools)β226Updated 6 months ago
- Utils use to dump android ELF from memory and do some fix including the ELF section header rebuildingβ456Updated 5 years ago
- Engine used by jnitrace to intercept JNI API calls.β323Updated 2 years ago
- An application for detecting the runtime environment on the Android platform.β141Updated 9 months ago
- Android ε εΊεΊη¨HookζΉεΌ-Fridaβ289Updated 2 years ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.β199Updated 2 years ago
- β373Updated 4 months ago
- Jnitrace for cppβ292Updated last year