corellium / sudLinks
sud - a su daemon for corellium devices
☆29Updated 3 years ago
Alternatives and similar repositories for sud
Users that are interested in sud are comparing it to the libraries listed below
Sorting:
- A "shim" for loading native jni files for Android active debugging☆179Updated 2 years ago
- A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )☆116Updated 7 years ago
- Dump Android Verified Boot Signature☆62Updated 6 years ago
- DroidGuard VM Samples☆59Updated 3 years ago
- ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.☆112Updated 6 years ago
- Plugins for reversing android apps in JEB☆76Updated last year
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- PoC to bypass Android restrictions☆210Updated 6 years ago
- A portable utility to locate android binder service☆95Updated 6 years ago
- A Linux kernel IPC firewall and logger for Android and Binder☆138Updated 5 years ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆81Updated 3 years ago
- PoC Frida script to view Android libbinder traffic☆139Updated last year
- Android Unpacking Automation using Corellium Devices☆135Updated 5 months ago
- Example showing how to use Frida for standalone injection of a custom payload☆163Updated 5 years ago
- Slim dockerized Android ndk☆11Updated 2 years ago
- A graph-based static-dynamic hybrid DEX code analysis tool☆39Updated 7 years ago
- ☆27Updated 5 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- Unofficial port of setools to Android with additional sepolicy-inject utility included☆270Updated 8 years ago
- Utilitiy for working with Android firmware .img files☆35Updated 6 years ago
- LD_PRELOAD magic for Android's AssetManager☆79Updated 3 years ago
- ART tracing research☆92Updated 2 years ago
- ☆84Updated 4 years ago
- Detection of TEEs on Android devices☆28Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Container and system event tracing using eBPF☆34Updated last week
- Bypass dynamic linking function restriction on Android by forging caller address☆40Updated 3 years ago
- A linux / android / MacOS hooking framework☆111Updated 3 years ago
- Android app for demonstrating native library harnessing☆41Updated 6 years ago
- Modify Android applications at source-level in Android Studio☆85Updated 5 years ago