ctz / tee-checker
Detection of TEEs on Android devices
☆26Updated 9 years ago
Alternatives and similar repositories for tee-checker:
Users that are interested in tee-checker are comparing it to the libraries listed below
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆60Updated 10 years ago
- Android OAT Plugin for JEB☆46Updated last year
- inotifywait for Android☆101Updated 9 years ago
- Android app for demonstrating native library harnessing☆41Updated 6 years ago
- JEB Scripts☆19Updated 10 years ago
- CVE-2014-4322 Exploit☆23Updated 8 years ago
- mtkfb exploit for mt658x & mt6592☆33Updated 9 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆42Updated 6 years ago
- An Android port of radamsa fuzzer☆65Updated 5 years ago
- SEAndroid Analytics Library for live device analysis☆58Updated 5 years ago
- Contains many different ways to identify hostile environments.☆63Updated 8 years ago
- CVE-2015-3636 exploit☆43Updated 9 years ago
- ☆23Updated 7 years ago
- android arm64(aarch64) code inject☆39Updated 9 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆71Updated 9 years ago
- Extended oatdump from AOSP platform/art repo☆134Updated 7 years ago
- ☆31Updated 8 years ago
- ☆40Updated 8 years ago
- A portable utility to locate android binder service☆91Updated 5 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Xposed module for obtaining SQLCipher crypto keys☆37Updated 7 years ago
- Parse and tamper DEX file☆17Updated 8 years ago
- slide and full exploit☆86Updated 4 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- source code & PoC file of launchAnyWhere problem☆40Updated 10 years ago