foundryzero / binder-traceLinks
Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".
☆715Updated last month
Alternatives and similar repositories for binder-trace
Users that are interested in binder-trace are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel …☆329Updated 2 years ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆697Updated last year
- Analysis scripts for Ghidra to work with Android NDK libraries.☆349Updated 2 years ago
- Deobfuscator for Android Application☆456Updated 3 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆354Updated 2 years ago
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆565Updated 4 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆150Updated last year
- Dynamic injection tool for Linux/Android☆181Updated 9 months ago
- Detect Frida for Android☆782Updated 4 years ago
- Public researchings of the Google's Android apps protection☆324Updated 2 months ago
- Significant security enchancements of recent major Android versions.☆177Updated 3 months ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆207Updated last year
- Property extractor for Android apps☆301Updated 7 months ago
- A couple of methods for detecting Frida on Android.☆483Updated 3 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆522Updated last year
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆422Updated 3 weeks ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,110Updated 2 years ago
- RASP (Runtime Application Self-Protection) solution for protecting Android apps against being run on vulnerable devices.☆107Updated last month
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆266Updated 2 years ago
- Find JNI function signatures in APK and apply to reverse-engineering tools.☆637Updated 8 months ago
- Frida Android utilities☆260Updated last year
- ☆446Updated 3 months ago
- O-MVLL is a code obfuscator based on LLVM for native code (Android & iOS)☆820Updated last week
- A tool that helps you work with frida easily for Android platform☆590Updated 11 months ago
- Script to quickly hook natives call to JNI in Android☆598Updated 2 years ago
- MCP server for JADX-AI Plugin☆189Updated this week
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆180Updated last year
- Defeat Java packers via Frida instrumentation☆206Updated 2 years ago
- Anti-Debug and Anti-Memory Dump for Android☆276Updated 4 years ago
- A Collection of Android (Samsung) Security Research References☆448Updated 3 months ago