ajinabraham / Xenotix-APK-Reverser
Xenotix APK Reverser is an OpenSource Android Application Package (APK) decompiler and disassembler powered by dex2jar, baksmali and jd-core.
☆75Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for Xenotix-APK-Reverser
- Unpacker for the HoseDex2Jar APK Protection which packs the original file inside the dex header☆70Updated 11 years ago
- Bypass signature and permission checks for IPCs☆83Updated 10 years ago
- Android ADB backup APK Injection POC☆138Updated 9 years ago
- Exploit for Android Zip bugs: 8219321, 9695860, and 9950697☆144Updated 10 years ago
- Freely available (GPLv3) xml files for the identification of Android devices.☆62Updated 9 years ago
- Android Device Testing Framework ("dtf")☆85Updated last year
- Make any application debuggable☆131Updated 10 years ago
- Google Play checkin utility. Creates a configurable hardware profile and gets a GSF ID for it.☆62Updated 7 years ago
- Extended oatdump from AOSP platform/art repo☆134Updated 7 years ago
- An Android Root Shell Framework☆150Updated 7 years ago
- ☆29Updated 9 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆84Updated 8 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆186Updated 9 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆122Updated 9 years ago
- Android OAT Plugin for JEB☆46Updated last year
- Contains many different ways to identify hostile environments.☆63Updated 8 years ago
- Got Root!☆84Updated 10 years ago
- A demo to show how to install Xposed and enable Xposed based module automatically☆29Updated 10 years ago
- Linux Version of APK Multi-Tool☆79Updated 6 years ago
- Improved flashing support for the Genymotion emulator☆82Updated 9 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆117Updated 9 years ago
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆146Updated 9 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- Scripts used to improve productivity and workflow☆34Updated 6 years ago
- ☆71Updated 8 years ago
- Signature based scanner that detects ad networks in Android apps.☆15Updated 10 years ago
- restart adbd with root privileges☆161Updated 7 years ago