afjoseph / decrypticon
Java-layer Android Malware Simplifier
☆25Updated 2 years ago
Related projects: ⓘ
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 4 years ago
- Frida module utils, writen in typescript☆16Updated 7 months ago
- Android library for detecting Android virtual containers.☆67Updated 3 years ago
- ☆32Updated 4 years ago
- Higher-level Python interface for frida☆21Updated 5 months ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆42Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 3 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆21Updated 3 years ago
- A smali emulator.☆23Updated 6 years ago
- InHouse safetynet killer☆28Updated 5 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆27Updated 5 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆38Updated 3 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- A collection of secRet frida scripts☆64Updated 3 years ago
- DroidGuard VM Samples☆44Updated 2 years ago
- A frida module to parse Elf headers in runtime☆30Updated 5 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- Utility to read custom structure from Tencent's libshell packer☆37Updated 5 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆9Updated 4 years ago
- Some crackme i built for Android☆11Updated 4 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- poxyran's blog☆11Updated 4 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 2 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆93Updated 7 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆34Updated last year
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 3 years ago
- ☆18Updated 2 years ago
- ☆35Updated 5 years ago
- rewrite dex file☆40Updated 2 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 6 years ago