fi01 / android_run_root_shellLinks
☆23Updated 12 years ago
Alternatives and similar repositories for android_run_root_shell
Users that are interested in android_run_root_shell are comparing it to the libraries listed below
Sorting:
- Dalvik vm Instrumentation OS☆87Updated 9 years ago
- Various Jeb plugins, including obfuscation restore☆92Updated 9 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 8 years ago
- Android Unpack tool based on Cydia☆91Updated 7 years ago
- PoC code for 32 bit Android OS☆135Updated 10 years ago
- a lightweight debugger for android virtual machine.☆143Updated 9 years ago
- ☆74Updated 10 years ago
- inotifywait for Android☆105Updated 10 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆86Updated 10 years ago
- IDA python script to dynamically dump DEX in memory☆143Updated 9 years ago
- Extended oatdump from AOSP platform/art repo☆136Updated 8 years ago
- OAT AXML ARSC Template for 010Editor☆77Updated 8 years ago
- ☆27Updated 9 years ago
- CVE-2015-3636 exploit☆45Updated 10 years ago
- mtkfb exploit for mt658x & mt6592☆35Updated 10 years ago
- restart adbd with root privileges☆166Updated 9 years ago
- A libparse implementation of a Dex parser☆22Updated 12 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Updated 10 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- Mirror of git://android.git.kernel.org/platform/dalvik.git with TaintDroid additions (mirror lags official Android)☆49Updated 11 years ago
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆113Updated 11 years ago
- It's very similiar to Substrate. But I give you three methods to do HOOK.☆213Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Updated 10 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- An android hook tools based on cydia substrate☆27Updated 9 years ago
- The slides and exploit of mosec2016☆112Updated 9 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆77Updated 10 years ago
- ☆31Updated 9 years ago
- statically vetting android apps based soot☆19Updated 10 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Updated 9 years ago