ZSShen / XposedGadget
A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking mysterious malware behavior.
☆15Updated 6 years ago
Alternatives and similar repositories for XposedGadget:
Users that are interested in XposedGadget are comparing it to the libraries listed below
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- JNI Helper Plugin☆52Updated 2 months ago
- Android runtime jit binary file parser☆13Updated 7 years ago
- 娜迦DEX文件修复程序☆25Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Start method tracing using Android's internal APIs☆12Updated 7 years ago
- ☆31Updated 8 years ago
- ☆39Updated 7 years ago
- ☆12Updated 7 years ago
- JEB Scripts☆20Updated 10 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- ☆32Updated 5 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 5 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- POCs for IOMemoryDescriptor racing bugs in iOS/OSX kernels☆19Updated 8 years ago
- reproduce the experiment in the report.☆27Updated 10 years ago
- ☆27Updated 8 years ago
- Android Cryptographic primitives hooking plugin for JEB☆18Updated 6 years ago
- CVE-2014-4322 Exploit☆23Updated 9 years ago
- PoC code for CVE-2017-13253☆39Updated 4 years ago
- ☆24Updated 7 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago