UchihaL / AppSpearLinks
a universal and automated unpacking system
☆45Updated 8 years ago
Alternatives and similar repositories for AppSpear
Users that are interested in AppSpear are comparing it to the libraries listed below
Sorting:
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆91Updated 7 years ago
- Android Library Code Recognition☆83Updated last year
- JNI Helper Plugin☆54Updated last year
- ☆32Updated 6 years ago
- ☆34Updated 3 months ago
- Android app for demonstrating native library harnessing☆42Updated 7 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- IDA debugging plugin for android armv7 so☆87Updated 7 years ago
- rewrite dex file☆42Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆141Updated last year
- Android library for detecting Android virtual containers.☆71Updated 5 years ago
- use frida monitoring android app☆48Updated 7 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- Utility to read custom structure from Tencent's libshell packer☆39Updated 7 years ago
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Updated 6 years ago
- unpack UPX on android.☆35Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago
- Some reverse-engineering scripts☆119Updated 6 years ago
- A portable utility to locate android binder service☆98Updated 6 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- Automated Frida hook generation with JEB☆152Updated 2 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- Intercept android apps based on unity3d (Mono) using Frida☆49Updated 6 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- ☆41Updated 8 years ago
- ☆28Updated 5 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆47Updated 8 years ago
- ☆89Updated 4 years ago
- ART tracing research☆92Updated 2 years ago