bkerler / JEB_Scripts
JEB Scripts
☆20Updated 10 years ago
Alternatives and similar repositories for JEB_Scripts:
Users that are interested in JEB_Scripts are comparing it to the libraries listed below
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆23Updated 11 years ago
- JNI Helper Plugin☆52Updated 2 months ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- ☆22Updated 6 years ago
- Configurable, flexible regex-based APK modification tool.☆36Updated 7 years ago
- ☆12Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆39Updated 7 years ago
- A tool to log method's parameters and return value.☆33Updated 10 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- Android OAT Plugin for JEB☆46Updated last year
- reproduce the experiment in the report.☆27Updated 10 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- A smali emulator.☆24Updated 6 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Extracting the strings from the .dex files with meaning.☆12Updated 7 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 9 years ago
- ☆31Updated 8 years ago
- An Android port of the melkor ELF fuzzer☆60Updated 10 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆14Updated 6 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago