adm1nkyj / JebToolBox
support to your reversing (jeb)
☆9Updated 2 years ago
Alternatives and similar repositories for JebToolBox:
Users that are interested in JebToolBox are comparing it to the libraries listed below
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 4 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆39Updated 4 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 2 years ago
- Fuzzing framework to target native components of android applications☆19Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆35Updated 4 years ago
- Higher-level Python interface for frida☆21Updated 9 months ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆19Updated 3 years ago
- Bytecode based Fuzzer for the PHP language☆11Updated 4 years ago
- ☆12Updated 2 years ago
- Frida module utils, writen in typescript☆15Updated last year
- Repository with research related to Android☆13Updated 6 years ago
- ☆10Updated 3 years ago
- ☆24Updated 3 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆22Updated 6 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- *For research purposes only*. Some proof of concept code to trig vulnerability or exploit them that I found before.☆24Updated 5 years ago
- CVE 2019-5791 working exploit☆20Updated 5 years ago
- A smali emulator.☆24Updated 6 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- ☆10Updated 3 months ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆25Updated 6 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- ☆16Updated 2 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- CTF binary exploit code☆38Updated 5 years ago
- Breaking secure checksums in the scudo heap allocator☆16Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- ☆73Updated 2 years ago