farnoodfaghihi / CamoDroidLinks
CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against emulator evasion. For more information and installation manual, please refer to CamoDroid's Wiki on GitHub.
☆32Updated 3 years ago
Alternatives and similar repositories for CamoDroid
Users that are interested in CamoDroid are comparing it to the libraries listed below
Sorting:
- Common IDA scripts for effective Reverse Enginnering☆174Updated 2 years ago
- 破解聚安全无线保镖sgavmp相关框架☆132Updated 5 years ago
- unidbg支持Android arm32 多线程☆72Updated 4 years ago
- blabla☆50Updated 4 years ago
- smali trace☆175Updated 3 years ago
- ☆64Updated 3 weeks ago
- ☆121Updated 2 years ago
- Instruction tracer powered by Frida☆140Updated 2 months ago
- You can run Android Runtime in Qiling☆28Updated 3 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆181Updated last year
- ART tracing research☆91Updated 2 years ago
- Hardware Assisted Unpacking of Android Apps☆57Updated 4 years ago
- ☆59Updated last year
- ☆156Updated 5 years ago
- strongR-frida☆215Updated 3 years ago
- ☆122Updated 3 years ago
- Reverse libsgmain 聚安全sgmain逆向☆107Updated 5 years ago
- ☆152Updated 5 years ago
- a few android analysis tools, jni trace by native hook, Java Object Format to Json for Xposed and Frida☆152Updated 2 weeks ago
- 安卓绕过ptrace反调试☆72Updated 4 years ago
- ☆114Updated 2 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆230Updated 4 years ago
- 木鱼 安卓APP分析沙箱☆78Updated last year
- 逆向聚安全litevm相关☆52Updated 5 years ago
- frida runtime resolves smali☆85Updated 2 months ago
- 对于目前主流android逆向工具的检测☆109Updated 2 years ago
- monitor svc calls of android☆73Updated 6 years ago
- Seccomp + Signal Intercept SVC☆89Updated last year
- ☆122Updated 5 years ago