ac-pm / Inspeckage
Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
☆2,841Updated 4 years ago
Alternatives and similar repositories for Inspeckage:
Users that are interested in Inspeckage are comparing it to the libraries listed below
- Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).☆802Updated 8 years ago
- Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)☆3,138Updated last year
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,118Updated this week
- Android virtual machine and deobfuscator☆4,485Updated 2 years ago
- Documentation:☆1,573Updated last year
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,410Updated 3 years ago
- Hand-crafted Frida examples☆2,331Updated last month
- 🔓 Disable SSL verification and pinning on Android, system-wide☆1,284Updated 5 years ago
- A frida tool to dump dex in memory to support security engineers analyzing malware.☆4,073Updated last year
- An xposed module that disables SSL certificate checking for the purposes of auditing an app with cert pinning☆4,921Updated 4 months ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,645Updated last year
- A Magisk/KernelSU module that automatically adds user certificates to the system root CA store☆1,810Updated last year
- A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.☆1,280Updated last year
- Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0☆1,135Updated 4 years ago
- ☆925Updated 3 years ago
- General Automatic Unpacking Tool for Android Dex Files☆1,327Updated 8 years ago
- Android certificate pinning disable tools☆1,388Updated 4 years ago
- The new bridge between Burp Suite and Frida!☆1,672Updated 9 months ago
- frida dump dex, frida dump so☆1,573Updated 3 years ago
- Android app dynamic reverse tool based on Xposed framework.☆1,014Updated 10 years ago
- Yet Another Hook Framework for ART☆1,578Updated 5 months ago
- Bypass SSL certificate pinning for most applications☆713Updated 6 years ago
- Full featured multi arch/os debugger built on top of PyQt5 and frida☆1,286Updated 8 months ago
- 基于Frida的脱壳工具☆1,401Updated 3 years ago
- Allows you to partly emulate an Android native library.☆1,405Updated 3 months ago
- 《FRIDA操作手册》by @hluwa @r0ysue☆2,978Updated 5 years ago
- ART环境下自动化脱壳方案☆2,376Updated this week
- 🔐 Run frida-server on boot with Magisk, always up-to-date☆993Updated this week
- Android ART Hook/Native Inline Hook/Single Instruction Hook - support 4.4 - 11.0 32/64 bit - Xposed API Compat☆2,074Updated last year
- Reverse engineering and pentesting for Android applications☆5,385Updated 2 weeks ago