farnoodfaghihi / CamoDroid
CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against emulator evasion. For more information and installation manual, please refer to CamoDroid's Wiki on GitHub.
☆28Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CamoDroid
- blabla☆47Updated 4 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆140Updated 5 months ago
- Python API Monitor for Android apps☆51Updated 4 months ago
- Hardware Assisted Unpacking of Android Apps☆53Updated 3 years ago
- ☆58Updated 4 months ago
- You can run Android Runtime in Qiling☆25Updated 2 years ago
- ☆110Updated last year
- Small Apps As PoC to Detect Frida With Frida☆51Updated 2 years ago
- monitor svc calls of android☆72Updated 6 years ago
- use frida monitoring android app☆49Updated 6 years ago
- A bunch of JEB python scripts☆46Updated 3 years ago
- Trace Android framework API, native libraries, system calls and other events using eBPF☆82Updated 4 months ago
- smali trace☆145Updated 2 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆57Updated 2 years ago
- An universal frida hook project☆51Updated last month
- a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog☆106Updated 6 months ago
- A dynamic analysis platform for Android☆42Updated 5 years ago
- ☆148Updated 4 years ago
- frida runtime resolves smali☆68Updated last week
- 对于目前主流android逆向工具的检测☆100Updated 2 years ago
- 关于Magisk生态的研究☆115Updated 6 months ago
- Android third-party library Detection☆16Updated 4 years ago
- Container and system event tracing using eBPF☆32Updated this week
- by using Android x86 Emulator☆50Updated 5 years ago
- ☆53Updated 3 years ago
- unidbg支持Android arm32 多线程☆71Updated 3 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆12Updated 2 years ago
- Seccomp + Signal Intercept SVC☆88Updated last year