UchihaL / AppSpearLinks
a universal and automated unpacking system
☆44Updated 7 years ago
Alternatives and similar repositories for AppSpear
Users that are interested in AppSpear are comparing it to the libraries listed below
Sorting:
- Android Library Code Recognition☆81Updated last year
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆90Updated 7 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- JNI Helper Plugin☆53Updated 7 months ago
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- ☆32Updated 5 years ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- use frida monitoring android app☆49Updated 6 years ago
- ☆32Updated last month
- PoC Frida script to view Android libbinder traffic☆139Updated last year
- Automated Frida hook generation with JEB☆149Updated 2 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆138Updated 9 years ago
- A frida module to parse Elf headers in runtime☆35Updated 6 years ago
- rewrite dex file☆42Updated 3 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 5 years ago
- ☆41Updated 8 years ago
- Some reverse-engineering scripts☆115Updated 6 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- Scripts to unpack APK protected by Legu☆217Updated 2 years ago
- ☆74Updated 8 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- unpack UPX on android.☆35Updated 6 years ago
- A portable utility to locate android binder service☆95Updated 5 years ago
- ☆62Updated 5 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago