Java-layer Android Malware Simplifier
☆27Jan 21, 2022Updated 4 years ago
Alternatives and similar repositories for decrypticon
Users that are interested in decrypticon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android ask repacked detect.☆13Jul 3, 2021Updated 4 years ago
- JDB++ an jdb extension for easily debugging through smali code☆23Jul 18, 2025Updated 9 months ago
- Android library for detecting Android virtual containers.☆72Dec 12, 2020Updated 5 years ago
- Loads data from the police and shows it nicely☆10Oct 2, 2017Updated 8 years ago
- Java reflection through JNI made easy.☆25Jul 8, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A modified android 8.1 for reverse engineer...☆11May 16, 2020Updated 5 years ago
- deollvm arm64 based unicorn☆34Jul 4, 2019Updated 6 years ago
- Slack-style link unfurl information in Java.☆10Nov 8, 2016Updated 9 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- Implementation of Android Debug Bridge (ADB) protocol in Python Twisted☆13Jun 14, 2018Updated 7 years ago
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- Android Things - PirSensor Tutorial☆12Mar 13, 2018Updated 8 years ago
- C++ name demangler written in javascript☆10Mar 3, 2023Updated 3 years ago
- static taint analysis of hybrid Android Apps (Java + HTML)☆13Jan 9, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Create different graphs from Android DEX bytecode to get insight in the code structure.☆19Jan 20, 2021Updated 5 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago
- A simple API client for Pod Point (https://pod-point.com) aimed at home users☆11Dec 27, 2024Updated last year
- C++ name demangling☆14Mar 23, 2016Updated 10 years ago
- qtrace release repository :)☆44Jan 6, 2026Updated 3 months ago
- ☆61Mar 29, 2026Updated last month
- This is a wrapper around the mono api.☆28Oct 16, 2021Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Print Android Binder Data about TRANSACTION☆24May 6, 2019Updated 6 years ago
- ☆52Sep 5, 2018Updated 7 years ago
- Java Library wrapper for Ghidra Headless Analysis + Java Samples☆21Nov 20, 2025Updated 5 months ago
- Control flow obfuscation for Java code☆12Oct 3, 2021Updated 4 years ago
- Protect Java Code from Decompilation, beyond Obfuscation☆13Nov 23, 2020Updated 5 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Compiling Noir to R1CS with witness generation and automatic differentiation binaries☆20Updated this week
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46May 31, 2020Updated 5 years ago
- Dwarf script to collect network requests and display on data panel☆21Mar 4, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A demontration of disassemblers generated by sleigh2rust☆13Nov 25, 2024Updated last year
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆13Apr 20, 2021Updated 5 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆34Mar 5, 2018Updated 8 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆16Apr 13, 2024Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Frida example to trace VBA CreateObject calls and some string deobfuscations calls. You need latest Frida 12.9.8 for improved symbol look…☆25Sep 3, 2020Updated 5 years ago