cryptax / dextools
Miscellaenous DEX (Dalvik Executable) tools
☆81Updated 8 months ago
Related projects: ⓘ
- ☆92Updated this week
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- android apk查壳工具源代码☆17Updated 9 years ago
- Contains many different ways to identify hostile environments.☆63Updated 8 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- LD_PRELOAD magic for Android's AssetManager☆77Updated 2 years ago
- CVE-2015-3636 exploit☆43Updated 8 years ago
- Android Library Code Recognition☆77Updated 4 months ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆93Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆116Updated 9 years ago
- Dex manipulation library☆99Updated 8 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆121Updated 9 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- A very rudimentary Android DEX file parser☆64Updated 10 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- Android OAT Plugin for JEB☆46Updated last year
- Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code …☆29Updated 5 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆39Updated 6 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆28Updated last year
- slide and full exploit☆86Updated 3 years ago
- An Online Analysis System for Packed Android Malware☆109Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 8 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 8 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 6 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆28Updated 9 years ago
- Dalvik Monitoring Framework for CuckooDroid☆91Updated 8 years ago
- Shim to grab keystore backed data☆27Updated 6 years ago
- An Android port of radamsa fuzzer☆64Updated 4 years ago