fatalSec / DaliVMLinks
Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required
☆74Updated last month
Alternatives and similar repositories for DaliVM
Users that are interested in DaliVM are comparing it to the libraries listed below
Sorting:
- ☆59Updated 11 months ago
- Contains all the scripts and sample apps related to android in app protections.☆40Updated 2 months ago
- Getting better stacks and backtraces in Frida☆58Updated 2 months ago
- ☆59Updated 2 years ago
- mobile reverse engineering framework☆78Updated this week
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- Stealth patch for Frida, stealth knowledge collection☆115Updated last year
- This repo will contain the material for reversing flutter applications.☆52Updated 6 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated last week
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆105Updated 3 years ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆145Updated last month
- Generic Frida Script To Bypass Root Detection☆56Updated 3 years ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- Android Overlay Hijack☆29Updated last year
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- xVision is a plugin for the JadX decompiler that aims to integrate with Large Language Models (LLMs) to provide code analysis directly in…☆67Updated 8 months ago
- Find JNI native methods while the app is running.☆21Updated last year
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Updated last year
- a simple project that uses Frida+QBDI to do tricks like JNI_OnLoad tracing on Android(AArch64).☆24Updated 2 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated 2 years ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆47Updated last year
- 基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。☆171Updated 3 weeks ago
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆93Updated last year
- ☆95Updated 3 years ago
- Dynamic injection tool for Linux/Android☆197Updated last year
- PoC for CVE-2024-23700, Android slient privilege escalation allow to read/write contacts, SMS, calendar, call log and voicemail, make out…☆46Updated last week
- Promon Shield String Deobfuscator☆41Updated last month
- ☆29Updated 7 months ago
- A Reversal and bypass for Appsealing☆84Updated last year