A recopilatory of useful android tools
☆91Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for Android-Tools
Users that are interested in Android-Tools are comparing it to the libraries listed below
Sorting:
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago
- This project tries to integrate imgui to an Android Cocos2d-x game using Frida☆14Jul 19, 2022Updated 3 years ago
- Some crackme i built for Android☆12Apr 15, 2020Updated 5 years ago
- Multithreaded lz4 for Android☆16Apr 3, 2016Updated 9 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- ☆11May 19, 2017Updated 8 years ago
- A smali apk patcher designed to unlock hidden features in apps☆12Mar 6, 2022Updated 3 years ago
- A java obfuscator (GUI)☆12Mar 7, 2021Updated 4 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Jan 26, 2020Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆13Aug 1, 2017Updated 8 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- How to Mod PlayerPrefs of Unity Games (including IL2CPP)☆16May 24, 2024Updated last year
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- CITL's static analysis engine for native code artifacts☆20Apr 29, 2021Updated 4 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- Android Emulator for mobile security testing☆225Nov 14, 2021Updated 4 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Aug 14, 2023Updated 2 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 7 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- How to Downgrade A7 Device from 10.3.x to 10.2/10.2.1 with Blobs☆21Dec 27, 2017Updated 8 years ago
- Template for OTC Infrastructure Charts☆12Oct 16, 2025Updated 4 months ago
- all credits to prefare for his work -Zysgik il2cpp dumper i just changed the way it worked☆24Jul 11, 2022Updated 3 years ago
- Códigos gerais em Python☆19Aug 25, 2021Updated 4 years ago
- site source jivoi.github.io☆22Nov 7, 2022Updated 3 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Jan 29, 2026Updated last month
- Attack Tree modeling sheet for Dia☆20Oct 9, 2018Updated 7 years ago
- java unserialize vulnerability payload☆21Apr 20, 2019Updated 6 years ago
- Fighting String Encryption in Android Malware☆59May 23, 2022Updated 3 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago