Java-layer Android Malware Simplifier
☆27Jan 21, 2022Updated 4 years ago
Alternatives and similar repositories for decrypticon
Users that are interested in decrypticon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android ask repacked detect.☆13Jul 3, 2021Updated 4 years ago
- JDB++ an jdb extension for easily debugging through smali code☆23Jul 18, 2025Updated 8 months ago
- Android library for detecting Android virtual containers.☆71Dec 12, 2020Updated 5 years ago
- Java reflection through JNI made easy.☆25Jul 8, 2016Updated 9 years ago
- A modified android 8.1 for reverse engineer...☆11May 16, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- deollvm arm64 based unicorn☆35Jul 4, 2019Updated 6 years ago
- Slack-style link unfurl information in Java.☆10Nov 8, 2016Updated 9 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- Implementation of Android Debug Bridge (ADB) protocol in Python Twisted☆13Jun 14, 2018Updated 7 years ago
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- Android Things - PirSensor Tutorial☆12Mar 13, 2018Updated 8 years ago
- ☆32Feb 11, 2026Updated 2 months ago
- C++ name demangler written in javascript☆10Mar 3, 2023Updated 3 years ago
- static taint analysis of hybrid Android Apps (Java + HTML)☆13Jan 9, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Create different graphs from Android DEX bytecode to get insight in the code structure.☆19Jan 20, 2021Updated 5 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago
- A simple API client for Pod Point (https://pod-point.com) aimed at home users☆10Dec 27, 2024Updated last year
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆505Mar 19, 2019Updated 7 years ago
- C++ name demangling☆14Mar 23, 2016Updated 10 years ago
- qtrace release repository :)☆43Jan 6, 2026Updated 3 months ago
- ☆61Mar 29, 2026Updated last week
- This is a wrapper around the mono api.☆28Oct 16, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- Print Android Binder Data about TRANSACTION☆24May 6, 2019Updated 6 years ago
- ☆52Sep 5, 2018Updated 7 years ago
- Control flow obfuscation for Java code☆12Oct 3, 2021Updated 4 years ago
- Protect Java Code from Decompilation, beyond Obfuscation☆13Nov 23, 2020Updated 5 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- ☆20Apr 3, 2026Updated last week
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46May 31, 2020Updated 5 years ago
- Dwarf script to collect network requests and display on data panel☆21Mar 4, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A demontration of disassemblers generated by sleigh2rust☆13Nov 25, 2024Updated last year
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆34Mar 5, 2018Updated 8 years ago
- Auto-Hacking-USB..... Explains Itself!☆13Jan 16, 2015Updated 11 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42May 7, 2023Updated 2 years ago