farnoodfaghihi / CamoDroidLinks
CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against emulator evasion. For more information and installation manual, please refer to CamoDroid's Wiki on GitHub.
☆33Updated 3 years ago
Alternatives and similar repositories for CamoDroid
Users that are interested in CamoDroid are comparing it to the libraries listed below
Sorting:
- blabla☆49Updated 4 years ago
- Common IDA scripts for effective Reverse Enginnering☆173Updated 2 years ago
- smali trace☆185Updated 3 years ago
- You can run Android Runtime in Qiling☆29Updated 3 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆189Updated last year
- 破解聚安全无线保镖sgavmp相关框架☆132Updated 5 years ago
- ☆61Updated last year
- ☆123Updated 5 years ago
- ☆122Updated 2 years ago
- Instruction tracer powered by Frida☆140Updated 4 months ago
- ART tracing research☆92Updated 2 years ago
- unidbg支持Android arm32 多线程☆71Updated 4 years ago
- Hardware Assisted Unpacking of Android Apps☆56Updated 4 years ago
- ☆158Updated 5 years ago
- ☆150Updated 5 years ago
- use frida monitoring android app☆48Updated 7 years ago
- ☆124Updated 4 years ago
- Reverse libsgmain 聚安全sgmain逆向☆113Updated 5 years ago
- Container and system event tracing using eBPF☆34Updated this week
- frida runtime resolves smali☆86Updated 5 months ago
- ☆144Updated last month
- strongR-frida☆217Updated 4 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆59Updated 3 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆232Updated 5 years ago
- Small Apps As PoC to Detect Frida With Frida☆53Updated 3 years ago
- monitor svc calls of android☆72Updated 7 years ago
- ☆57Updated 3 years ago
- 安卓绕过ptrace反调试☆70Updated 4 years ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆163Updated last month
- 生成frida框架hook java的js代码☆87Updated 8 years ago