foundryzero / binder-trace
Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".
☆578Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for binder-trace
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆279Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆140Updated 11 months ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆464Updated 3 months ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆330Updated last year
- Analysis scripts for Ghidra to work with Android NDK libraries.☆321Updated last year
- JADX-gui scripting plugin for dynamic decompiler manipulation☆601Updated 9 months ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆197Updated last year
- Detect Frida for Android☆692Updated 3 years ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆232Updated last year
- Frida Android utilities☆248Updated 9 months ago
- 🔓A curated list of modern Android exploitation conference talks.☆455Updated last month
- Deobfuscator for Android Application☆406Updated 2 years ago
- Android Kernel Exploitation☆587Updated 2 years ago
- Property extractor for Android apps☆267Updated 3 weeks ago
- A couple of methods for detecting Frida on Android.☆449Updated 2 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆469Updated 7 months ago
- A tool that helps you work with frida easily for Android platform☆463Updated last week
- O-MVLL is a LLVM-based obfuscator for native code (Android & iOS)☆628Updated last week
- Injects frida gadget using zygisk to bypass anti-tamper checks.☆500Updated 6 months ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,059Updated last year
- Significant security enchancements of recent major Android versions.☆159Updated 3 weeks ago
- Script to quickly hook natives call to JNI in Android☆535Updated last year
- The ARTful library for dynamically modifying the Android Runtime☆310Updated 7 months ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆541Updated 3 weeks ago
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆278Updated this week
- Anti-Debug and Anti-Memory Dump for Android☆254Updated 3 years ago
- ☆377Updated 4 months ago
- Defeat Java packers via Frida instrumentation☆196Updated 2 years ago
- Radare2 and Frida better together.☆1,190Updated this week
- Binary instrumentation framework based on FRIDA☆1,579Updated this week