ele7enxxh / CVE-2014-7911
☆7Updated 8 years ago
Alternatives and similar repositories for CVE-2014-7911:
Users that are interested in CVE-2014-7911 are comparing it to the libraries listed below
- Android Injector☆23Updated 8 years ago
- android arm64(aarch64) code inject☆13Updated 9 years ago
- ☆39Updated 7 years ago
- An android hook tools based on cydia substrate☆26Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆93Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 9 years ago
- ☆27Updated 8 years ago
- Parse and tamper DEX file☆17Updated 8 years ago
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago
- OAT AXML ARSC Template for 010Editor☆76Updated 7 years ago
- ☆31Updated 8 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆42Updated 6 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- ☆33Updated 9 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- JNI Helper Plugin☆52Updated last month
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 9 years ago
- Android Library Code Recognition☆78Updated 8 months ago
- CVE-2015-3636 exploit☆43Updated 9 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆33Updated 9 years ago
- ☆31Updated 8 years ago
- ☆58Updated 7 years ago
- Extracting the strings from the .dex files with meaning.☆11Updated 7 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆23Updated 11 years ago