fatalSec / DaliVMLinks
Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required
☆78Updated last month
Alternatives and similar repositories for DaliVM
Users that are interested in DaliVM are comparing it to the libraries listed below
Sorting:
- ☆59Updated 11 months ago
- Contains all the scripts and sample apps related to android in app protections.☆40Updated 2 months ago
- Getting better stacks and backtraces in Frida☆61Updated 2 months ago
- ☆59Updated 2 years ago
- mobile reverse engineering framework☆78Updated last week
- Stealth patch for Frida, stealth knowledge collection☆115Updated last year
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆147Updated last month
- This repo will contain the material for reversing flutter applications.☆52Updated 6 months ago
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆47Updated last year
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Find JNI native methods while the app is running.☆21Updated last year
- xVision is a plugin for the JadX decompiler that aims to integrate with Large Language Models (LLMs) to provide code analysis directly in…☆67Updated 8 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated this week
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆106Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated 2 years ago
- Generate Frida hooks directly from JEB!☆90Updated 3 months ago
- Dynamic injection tool for Linux/Android☆197Updated last year
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Updated 2 years ago
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- Generic Frida Script To Bypass Root Detection☆56Updated 3 years ago
- PoC for CVE-2024-23700, Android slient privilege escalation allow to read/write contacts, SMS, calendar, call log and voicemail, make out…☆54Updated last week
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆171Updated this week
- App for learnfrida.info☆21Updated 3 years ago
- Android Overlay Hijack☆29Updated last year