ZSShen / YADD
Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code structure visualization.
☆29Updated 6 years ago
Alternatives and similar repositories for YADD:
Users that are interested in YADD are comparing it to the libraries listed below
- linux version (rewrite in Python)☆29Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆27Updated 8 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆23Updated 11 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- ☆38Updated 8 years ago
- ☆22Updated 10 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- ☆16Updated 9 years ago
- CVE-2014-4321 exploit☆20Updated 9 years ago
- ☆31Updated 8 years ago
- ☆23Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- ☆49Updated 8 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- ☆16Updated 7 years ago
- The slides and exploit of mosec2016☆112Updated 8 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 9 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- ☆22Updated 6 years ago
- ☆51Updated 8 years ago
- Collection of IDA scripts☆40Updated 7 years ago
- JEB Scripts☆19Updated 10 years ago
- ☆33Updated 9 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Updated 6 years ago