ZSShen / XposedGadgetLinks
A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking mysterious malware behavior.
☆14Updated 6 years ago
Alternatives and similar repositories for XposedGadget
Users that are interested in XposedGadget are comparing it to the libraries listed below
Sorting:
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 11 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- JNI Helper Plugin☆54Updated 11 months ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Android Vulnerability Reports and POCs.☆27Updated 8 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 7 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Updated 9 years ago
- Shim to grab keystore backed data☆27Updated 8 years ago
- JEB Scripts☆21Updated 10 years ago
- ☆12Updated 8 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- ☆40Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- some idapython scripts for android debugging.☆45Updated 8 years ago
- Android runtime jit binary file parser☆13Updated 7 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- ☆24Updated 8 years ago
- 娜迦DEX文件修复程序☆24Updated 8 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 7 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 10 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- Start method tracing using Android's internal APIs☆13Updated 7 years ago
- ☆31Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆47Updated 8 years ago
- Android Library Code Recognition☆83Updated last year
- PoC code for CVE-2017-13253☆37Updated 5 years ago
- Trace Log Generation (CLI) on a target device or emulator : Generating context information of every instruction from a specific point (in…☆22Updated 8 years ago
- LD_PRELOAD magic for Android's AssetManager☆79Updated 3 years ago