ctz / tee-checker
Detection of TEEs on Android devices
☆26Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for tee-checker
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- Android OAT Plugin for JEB☆46Updated last year
- android arm64(aarch64) code inject☆38Updated 9 years ago
- inotifywait for Android☆100Updated 9 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆40Updated 6 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- ☆31Updated 8 years ago
- Android Library Code Recognition☆78Updated 6 months ago
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- Android Injector☆23Updated 7 years ago
- AndroidSubstrate_hookingC_examples☆55Updated 9 years ago
- JEB Scripts☆19Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆23Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- CVE-2014-4322 Exploit☆22Updated 8 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- Parse and tamper DEX file☆17Updated 7 years ago
- An Android port of radamsa fuzzer☆64Updated 4 years ago
- Various Jeb plugins, including obfuscation restore☆14Updated 9 years ago
- Extract DEX files from an ART ELF binary☆40Updated 8 years ago
- ☆39Updated 7 years ago
- Xposed module for obtaining SQLCipher crypto keys☆37Updated 6 years ago
- A Linux kernel IPC firewall and logger for Android and Binder☆122Updated 4 years ago
- Configurable, flexible regex-based APK modification tool.☆35Updated 7 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- CVE-2015-3636 exploit☆43Updated 9 years ago
- android arm64(aarch64) code inject☆13Updated 9 years ago