foundryzero / binder-trace
Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".
☆631Updated 7 months ago
Alternatives and similar repositories for binder-trace:
Users that are interested in binder-trace are comparing it to the libraries listed below
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆288Updated last year
- JADX-gui scripting plugin for dynamic decompiler manipulation☆629Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆510Updated 7 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆339Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆141Updated last year
- Analysis scripts for Ghidra to work with Android NDK libraries.☆334Updated 2 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆578Updated 2 weeks ago
- Detect Frida for Android☆730Updated 3 years ago
- Deobfuscator for Android Application☆427Updated 2 years ago
- A couple of methods for detecting Frida on Android.☆467Updated 2 years ago
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆577Updated 10 months ago
- Script to quickly hook natives call to JNI in Android☆558Updated last year
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆202Updated last year
- Frida Android utilities☆253Updated last year
- A tool that helps you work with frida easily for Android platform☆508Updated 3 months ago
- 🔓A curated list of modern Android exploitation conference talks.☆492Updated 2 weeks ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆239Updated last year
- Code injection on Android without ptrace☆229Updated 11 months ago
- Anti-Debug and Anti-Memory Dump for Android☆262Updated 4 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,080Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆198Updated 2 years ago
- Radare2 and Frida better together.☆1,237Updated this week
- Property extractor for Android apps☆284Updated last week
- The ARTful library for dynamically modifying the Android Runtime☆319Updated 11 months ago
- O-MVLL is a code obfuscator based on LLVM for native code (Android & iOS)☆676Updated this week
- Engine used by jnitrace to intercept JNI API calls.☆315Updated last year
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,666Updated last year
- Android kernel exploitation for CVE-2022-20409☆175Updated 4 months ago
- Generic Script To Bypass Some AntiFrida Checks☆466Updated 6 months ago
- Public researchings of the Google's Android apps protection☆174Updated 4 months ago