foundryzero / binder-traceLinks
Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".
☆721Updated 2 months ago
Alternatives and similar repositories for binder-trace
Users that are interested in binder-trace are comparing it to the libraries listed below
Sorting:
- JADX-gui scripting plugin for dynamic decompiler manipulation☆701Updated last year
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆330Updated 2 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆151Updated last year
- Analysis scripts for Ghidra to work with Android NDK libraries.☆354Updated 2 years ago
- Deobfuscator for Android Application☆460Updated 3 years ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆568Updated last month
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Updated 2 years ago
- Detect Frida for Android☆790Updated 4 years ago
- Public researchings of the Google's Android apps protection☆350Updated 4 months ago
- Property extractor for Android apps☆306Updated 8 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆524Updated last year
- Significant security enchancements of recent major Android versions.☆181Updated 4 months ago
- Dynamic injection tool for Linux/Android☆192Updated 11 months ago
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆444Updated this week
- A couple of methods for detecting Frida on Android.☆486Updated 3 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- RASP (Runtime Application Self-Protection) solution for protecting Android apps against being run on vulnerable devices.☆122Updated 3 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆268Updated 2 years ago
- Defeat Java packers via Frida instrumentation☆208Updated 3 years ago
- The ARTful library for dynamically modifying the Android Runtime☆340Updated last year
- ☆452Updated 4 months ago
- Script to quickly hook natives call to JNI in Android☆611Updated 2 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,116Updated 2 years ago
- Frida Android utilities☆260Updated last year
- A tool that helps you work with frida easily for Android platform☆602Updated last year
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆650Updated 9 months ago
- MCP server for JADX-AI Plugin☆214Updated last week
- LLM tool to deobfuscate android app and find any potential vulnerabilities in android apps and code.☆283Updated 3 weeks ago
- Code injection on Android without ptrace☆269Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆183Updated last year