enovella / jebscripts
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
☆136Updated 9 years ago
Alternatives and similar repositories for jebscripts:
Users that are interested in jebscripts are comparing it to the libraries listed below
- Automated Frida hook generation with JEB☆144Updated last year
- Some frida scripts☆142Updated 6 years ago
- Android Library Code Recognition☆80Updated 11 months ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- PoC Frida script to view Android libbinder traffic☆135Updated 8 months ago
- Example showing how to use Frida for standalone injection of a custom payload☆160Updated 4 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 7 years ago
- Scripts to unpack APK protected by Legu☆216Updated 2 years ago
- Frida module to hook module initializations on android☆67Updated 4 years ago
- Various Jeb plugins, including obfuscation restore☆93Updated 8 years ago
- Android library for detecting Android virtual containers.☆68Updated 4 years ago
- Mobile security trainings based on android☆105Updated 4 years ago
- ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.☆112Updated 5 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 4 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆43Updated 6 years ago
- ART tracing research☆91Updated 2 years ago
- Sample scripts and extensions for JEB Decompiler.☆208Updated 2 months ago
- Collection of Android reverse engineering scripts☆416Updated 4 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- PoC to bypass Android restrictions☆207Updated 6 years ago
- A "shim" for loading native jni files for Android active debugging☆177Updated 2 years ago
- My own collection of Frida scripts and tricks☆68Updated 3 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Updated 9 years ago
- Examples of using frida to hook android apps☆170Updated 2 years ago
- Instructions tracing powered by frida☆178Updated 5 years ago
- A (hopefully) generic unpacker for packed Android apps.☆360Updated 3 years ago
- Shared Library Injector on Android☆147Updated 5 years ago