corellium / sudLinks
sud - a su daemon for corellium devices
☆29Updated 3 years ago
Alternatives and similar repositories for sud
Users that are interested in sud are comparing it to the libraries listed below
Sorting:
- DroidGuard VM Samples☆56Updated 3 years ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆80Updated 3 years ago
- Dump Android Verified Boot Signature☆62Updated 6 years ago
- Modify Android applications at source-level in Android Studio☆85Updated 5 years ago
- A "shim" for loading native jni files for Android active debugging☆179Updated 2 years ago
- Android Unpacking Automation using Corellium Devices☆133Updated 2 months ago
- Slim dockerized Android ndk☆12Updated 2 years ago
- A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )☆117Updated 7 years ago
- A linux / android / MacOS hooking framework☆109Updated 3 years ago
- PoC to bypass Android restrictions☆210Updated 6 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆100Updated 8 years ago
- APK Signature verification in Go. Supports scheme v1, v2 and v3 and passes Google apksig's testing suite.☆87Updated 3 weeks ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 9 years ago
- A Linux kernel IPC firewall and logger for Android and Binder☆135Updated 5 years ago
- ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.☆112Updated 5 years ago
- A portable utility to locate android binder service☆95Updated 5 years ago
- ☆40Updated 3 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆161Updated 5 years ago
- ☆72Updated 9 months ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- An app intended for fuzzing the Android Binder interface and System Services☆105Updated 4 years ago
- Shared Library Injector on Android☆151Updated 5 years ago
- Bypass dynamic linking function restriction on Android by forging caller address☆40Updated 3 years ago
- ☆74Updated 8 years ago
- Plugins for reversing android apps in JEB☆75Updated 9 months ago
- SafetyNet Jar download & extractor utility☆37Updated 7 years ago
- ARTist's deployment application, for code-injection on an Android device.☆37Updated 5 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆90Updated 7 years ago
- Qualcomm image unpacker☆85Updated 2 years ago