flankerhqd / jebmcp
☆46Updated 3 weeks ago
Alternatives and similar repositories for jebmcp:
Users that are interested in jebmcp are comparing it to the libraries listed below
- Code Scanner For Android Privacy☆38Updated 2 years ago
- Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mit…☆89Updated last year
- You can run Android Runtime in Qiling☆26Updated 2 years ago
- Android Root Zap Framework, Lazy and Powerful :)☆52Updated 2 years ago
- ☆58Updated 9 months ago
- blabla☆49Updated 4 years ago
- DexDumper based eBPF on Android Platform☆119Updated 3 months ago
- smali trace☆165Updated 2 years ago
- ☆12Updated 2 years ago
- btrace:binder_transaction+eBPF+Golang实现通用的Android APP动态行为追踪工具☆167Updated 10 months ago
- ☆20Updated 5 years ago
- monitor svc calls of android☆73Updated 6 years ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆63Updated 3 years ago
- Instruction tracer powered by Frida☆135Updated 3 months ago
- a poc implementation arm64 tracer based on simulation☆54Updated 3 years ago
- Seccomp + Signal Intercept SVC☆89Updated last year
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆81Updated 2 months ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- Open/HarmonyOS abc file parser and decompiler☆85Updated 7 months ago
- 木鱼安卓APP分析沙箱☆78Updated last year
- ☆116Updated 2 years ago
- 移动安全相关的一些面经和知识整理☆25Updated 4 years ago
- 010Editor template for .abc (Open/HarmonyOS Ark Bytecode) files☆41Updated 7 months ago
- 2023 年 羊城杯 ezAndroid dex VMP 恢复工具☆35Updated last year
- 梆梆加固反调试和root☆87Updated 3 years ago
- 安卓绕过ptrace反调试☆70Updated 4 years ago
- frida runtime resolves smali☆81Updated last week
- 对frida 16.2.1的patch☆60Updated 4 months ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆41Updated last year
- PendingIntent exploit☆11Updated last year