enovella / jebscripts
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
☆136Updated 9 years ago
Alternatives and similar repositories for jebscripts:
Users that are interested in jebscripts are comparing it to the libraries listed below
- Automated Frida hook generation with JEB☆141Updated last year
- Example showing how to use Frida for standalone injection of a custom payload☆159Updated 4 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 7 months ago
- Some frida scripts☆142Updated 6 years ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- Sample scripts and extensions for JEB Decompiler.☆206Updated last month
- Scripts to unpack APK protected by Legu☆216Updated last year
- PoC to bypass Android restrictions☆204Updated 5 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- Android Library Code Recognition☆79Updated 10 months ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆208Updated 10 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Mobile security trainings based on android☆104Updated 4 years ago
- My own collection of Frida scripts and tricks☆67Updated 3 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆42Updated 6 years ago
- Frida (Android) Script for extracting bluetooth information☆60Updated last year
- ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.☆111Updated 5 years ago
- Various Jeb plugins, including obfuscation restore☆93Updated 8 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 7 years ago
- This repo aims at providing practical examples on how to use r2frida☆199Updated 4 years ago
- Android library for detecting Android virtual containers.☆68Updated 4 years ago
- A "shim" for loading native jni files for Android active debugging☆175Updated 2 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 4 years ago
- Examples of using frida to hook android apps☆168Updated 2 years ago
- Collection of Android reverse engineering scripts☆415Updated 4 years ago
- Android Dex disassembler and Binary Ninja plugin☆60Updated 10 months ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆129Updated 9 years ago
- ART tracing research☆88Updated 2 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago