UnknownCollections / pysmaliLinks
Python library for parsing and unparsing smali files for programatic modification
☆18Updated 4 years ago
Alternatives and similar repositories for pysmali
Users that are interested in pysmali are comparing it to the libraries listed below
Sorting:
- Some crackme i built for Android☆12Updated 5 years ago
- Plugins for reversing android apps in JEB☆78Updated last year
- Python API Monitor for Android apps☆84Updated last year
- Files used to resolve the r2pay challenge☆55Updated 5 years ago
- A collection of secRet frida scripts☆66Updated 5 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆161Updated 2 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆141Updated last year
- Android library for detecting Android virtual containers.☆71Updated 5 years ago
- ☆30Updated 3 years ago
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Updated 3 years ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆28Updated 7 months ago
- DroidGuard VM Samples☆67Updated 3 years ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆105Updated 3 years ago
- Frida module to hook module initializations on android☆67Updated 5 years ago
- ☆59Updated 2 years ago
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- ☆32Updated 6 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆164Updated 5 years ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆19Updated 3 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 10 years ago
- A frida module to parse Elf headers in runtime☆37Updated 6 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆210Updated 2 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆141Updated 9 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆62Updated 5 years ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆31Updated 3 years ago
- Update Frida hooks automatically.☆27Updated 2 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 4 years ago