Miscellaneous code
☆109Jul 4, 2025Updated 7 months ago
Alternatives and similar repositories for misc-code
Users that are interested in misc-code are comparing it to the libraries listed below
Sorting:
- Property extractor for Android apps☆311Mar 24, 2025Updated 11 months ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- 一些frida脚本☆17Apr 29, 2020Updated 5 years ago
- Experiments on the feasibility of Flutter application reverse engineering☆172May 2, 2023Updated 2 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- ☆14Feb 19, 2021Updated 5 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆91Feb 6, 2018Updated 8 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- Sample scripts and extensions for JEB Decompiler.☆224Feb 7, 2026Updated 3 weeks ago
- Statically unpacking common android banker malware.☆160Apr 2, 2025Updated 10 months ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,122Feb 2, 2023Updated 3 years ago
- Generate Frida hooks directly from JEB!☆91Oct 11, 2025Updated 4 months ago
- ☆15Jun 24, 2021Updated 4 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆213Dec 4, 2025Updated 2 months ago
- Dart / Flutter VM snapshot analyzer☆340Feb 3, 2026Updated 3 weeks ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Feb 26, 2023Updated 3 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆104Jul 12, 2017Updated 8 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Jul 21, 2023Updated 2 years ago
- ☆73Dec 16, 2023Updated 2 years ago
- you can use frida in jeb !☆47Sep 25, 2022Updated 3 years ago
- A collection of frida scripts to facilitate reverse engineering of android apps.☆12Feb 20, 2024Updated 2 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- AArch64 assembler/disassembler support☆11Sep 7, 2017Updated 8 years ago
- This project tries to integrate imgui to an Android Cocos2d-x game using Frida☆14Jul 19, 2022Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Extract both control flow graphs and code parts from APK based on API calls.☆19Mar 22, 2023Updated 2 years ago
- A small script to get syscall info from its number (intented to be used with Frida)☆21Aug 11, 2021Updated 4 years ago
- Android SDK shell tool☆19Mar 5, 2021Updated 4 years ago
- Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android☆2,419Jan 29, 2026Updated 3 weeks ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Script to quickly hook natives call to JNI in Android☆625Aug 3, 2023Updated 2 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Oct 10, 2022Updated 3 years ago
- Work In progress to capture all sorts of data transaction on any Platform supported by Frida.☆11Feb 13, 2026Updated 2 weeks ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode)☆14Feb 3, 2024Updated 2 years ago