dweinstein / rs-google-playLinks
Rust conversion (in-progress) of https://github.com/dweinstein/node-google-play.
☆25Updated 4 years ago
Alternatives and similar repositories for rs-google-play
Users that are interested in rs-google-play are comparing it to the libraries listed below
Sorting:
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆81Updated 3 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆140Updated 9 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- Frida tool to dump an NSS Key Log for Wireshark, from a process using dynamically linked OpenSSL (or BoringSSL)☆117Updated 7 years ago
- PoC to bypass Android restrictions☆210Updated 6 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆163Updated 5 years ago
- Google Play API for Rust☆39Updated 8 months ago
- DroidGuard VM Samples☆59Updated 3 years ago
- A "shim" for loading native jni files for Android active debugging☆179Updated 2 years ago
- PoC Frida script to view Android libbinder traffic☆139Updated last year
- A collection of secRet frida scripts☆63Updated 4 years ago
- Plugins for reversing android apps in JEB☆76Updated last year
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆135Updated 4 years ago
- LD_PRELOAD magic for Android's AssetManager☆79Updated 3 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆65Updated 4 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆34Updated 2 years ago
- Automated Frida hook generation with JEB☆150Updated 2 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆206Updated last year
- My own collection of Frida scripts and tricks☆68Updated 4 years ago
- ☆30Updated 3 years ago
- sud - a su daemon for corellium devices☆29Updated 3 years ago
- Files used to resolve the r2pay challenge☆53Updated 5 years ago
- Android Library Code Recognition☆83Updated last year
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆117Updated 3 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 6 years ago
- Java-layer Android Malware Simplifier☆27Updated 3 years ago
- Inspect and manipulate UIWebView-hosted GUIs through Frida.☆50Updated 3 months ago