cryptax / dextools
Miscellaenous DEX (Dalvik Executable) tools
☆82Updated last year
Alternatives and similar repositories for dextools:
Users that are interested in dextools are comparing it to the libraries listed below
- linux version (rewrite in Python)☆29Updated 9 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 9 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 9 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Updated 9 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- LD_PRELOAD magic for Android's AssetManager☆78Updated 2 years ago
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆118Updated 10 years ago
- Dex manipulation library☆103Updated 9 years ago
- Extracting the strings from the .dex files with meaning.☆12Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Android OAT Plugin for JEB☆47Updated last year
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆43Updated 6 years ago
- ☆31Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- PoC code for 32 bit Android OS☆133Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- A simple tool to help finding JNI calls in a x86/ARM disassembly listing☆81Updated 7 years ago
- ☆33Updated 9 years ago
- Dalvik Monitoring Framework for CuckooDroid☆92Updated 8 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago