UbiqueInnovation / rusty-jeb
Rust wrapper for the JEB api
☆9Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for rusty-jeb
- Command line utility for APK fingerprinting☆11Updated last year
- ☆18Updated 2 years ago
- 娜迦DEX文件修复程序☆25Updated 7 years ago
- Load dex on ART in interpret mode☆17Updated 5 years ago
- Quick and dirty hacks to explore ART internals☆11Updated 4 years ago
- Dwarf script to collect network requests and display on data panel☆19Updated 4 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Updated last year
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 3 years ago
- A command line utility for managing Frida.☆20Updated last year
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- A smali emulator.☆24Updated 6 years ago
- The Python interface for YARA http://virustotal.github.io/yara/☆20Updated 7 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- A frida module to parse Elf headers in runtime☆31Updated 5 years ago
- Python 3 bridge to the JEB reverse engineering tool's Python environment☆11Updated 4 years ago
- ☆17Updated 5 years ago
- Code profiler based on Frida☆30Updated 3 years ago
- ☆13Updated 7 years ago
- Android Cryptographic primitives hooking plugin for JEB☆17Updated 5 years ago
- ☆21Updated 6 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆21Updated 3 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- An analyzer of JNI code that matches native code information with Java code☆21Updated 3 years ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 9 years ago
- ☆11Updated 4 years ago