apkunpacker / CheckBeerLinks
Easy-to-use Android library for tampering detection, with a sample app included
☆62Updated 9 months ago
Alternatives and similar repositories for CheckBeer
Users that are interested in CheckBeer are comparing it to the libraries listed below
Sorting:
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆64Updated last year
- Getting better stacks and backtraces in Frida☆58Updated last month
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆46Updated last year
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆39Updated last year
- App for learnfrida.info☆21Updated 3 years ago
- A Reversal and bypass for Appsealing☆84Updated last year
- https://github.com/frida/frida-python with devkit☆29Updated 5 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆59Updated last week
- You can bypass various Android security system checks such as Signature Verification, Integrity Check, etc. with this repo.☆67Updated 3 years ago
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆19Updated 3 years ago
- Frida's setHardwareWatchpoint tutorial☆62Updated last year
- Pine and Frida better together☆14Updated last year
- ☆47Updated 3 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- Inject shared libraries into processes on Android (real/emulator device supported)☆105Updated last year
- Promon Shield String Deobfuscator☆38Updated 8 months ago
- ☆57Updated 2 years ago
- An Android Injector aimed to inject through Virtual Space without root permissions☆172Updated 11 months ago
- a C++ library / template for patching process memory on unix systems (including android).☆54Updated 2 years ago
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Updated 2 years ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆28Updated 7 months ago
- ☆59Updated 10 months ago
- Some Of Anti-Frida Stuff☆127Updated 3 years ago
- PoC of using android:name attribute for hooking☆21Updated 2 months ago
- Toolset which makes possible hiddenly inject code in Android apps through system libraries☆70Updated 4 months ago
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆88Updated 8 months ago
- silent syscall hooking without modifying sys_call_table/handlers via patching exception handler☆150Updated last year
- Android reverse-engineering tool / smali editor☆223Updated 2 months ago
- Forked from codehasan/dex2c☆18Updated 11 months ago
- ☆51Updated 5 months ago