erev0s / ClassLoaderExampleLinks
☆19Updated 2 years ago
Alternatives and similar repositories for ClassLoaderExample
Users that are interested in ClassLoaderExample are comparing it to the libraries listed below
Sorting:
- Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createF…☆118Updated 3 years ago
- Plugins for reversing android apps in JEB☆75Updated 9 months ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- Files used to resolve the r2pay challenge☆52Updated 4 years ago
- Tamper detection in Android☆90Updated 4 years ago
- Python API Monitor for Android apps☆76Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated last year
- ACVTool (Android Code Coverage Tool) is a tool to measure fine-grained code coverage of 3rd-party Android apps.☆129Updated 3 weeks ago
- PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta☆28Updated 3 years ago
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆315Updated 2 years ago
- Significant security enchancements of recent major Android versions.☆175Updated last week
- PoC Frida script to view Android libbinder traffic☆139Updated 11 months ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆92Updated last year
- Some Of Anti-Frida Stuff☆124Updated 3 years ago
- A set of techniques to protect against overlays on Android☆29Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆144Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆96Updated last year
- ☆83Updated 3 years ago
- ☆51Updated last year
- RASP (Runtime Application Self-Protection) solution for protecting Android apps against being run on vulnerable devices.☆94Updated 2 months ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆58Updated last year
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- Python library for parsing and unparsing smali files for programatic modification☆18Updated 4 years ago
- PoC to bypass Android restrictions☆210Updated 6 years ago
- Defeat Java packers via Frida instrumentation☆205Updated 2 years ago
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆95Updated 3 years ago
- Miscellaneous code☆109Updated last week
- DroidGuard VM Samples☆56Updated 3 years ago
- A way to detect magisk hide using an Android feature☆214Updated 3 years ago
- ☆30Updated 3 years ago