evilsocket / ghidra-reLinks
An AI agent to use Ghidra with any AI.
☆24Updated 9 months ago
Alternatives and similar repositories for ghidra-re
Users that are interested in ghidra-re are comparing it to the libraries listed below
Sorting:
- Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required☆61Updated 2 weeks ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated last year
- ☆63Updated last year
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x.☆237Updated 2 weeks ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Updated last year
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- mobile reverse engineering framework☆57Updated this week
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated 2 years ago
- Getting better stacks and backtraces in Frida☆58Updated last month
- Dynamic injection tool for Linux/Android☆195Updated last year
- This is POC for IOS 0click CVE-2025-43300☆102Updated 4 months ago
- A modular and extendable Python tool for emulating simple SMALI code.☆93Updated last year
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Updated last month
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆36Updated 3 years ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆235Updated 3 months ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆30Updated 8 months ago
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆161Updated 2 years ago
- Easy-to-use Android library for tampering detection, with a sample app included☆62Updated 10 months ago
- Remote library injection into Android processes, then hooking via various methods☆65Updated last month
- Interact with Frida devices, processes, and scripts directly from your browser.☆47Updated this week
- Type diagram plugin for JADX decompiler☆74Updated last month
- MCP stdio server for radare2☆126Updated this week
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆52Updated 4 months ago
- ☆59Updated 11 months ago
- Android Overlay Hijack☆29Updated last year
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆37Updated 8 months ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆47Updated last year
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated 2 weeks ago