freshui / dexBytecodeTamper
A simple example for tampering bytecode
☆22Updated 11 years ago
Alternatives and similar repositories for dexBytecodeTamper:
Users that are interested in dexBytecodeTamper are comparing it to the libraries listed below
- Android Injector☆23Updated 8 years ago
- ☆31Updated 8 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 9 years ago
- zygote hook for art in android 6.0 and more☆52Updated 7 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 7 years ago
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆48Updated 9 years ago
- android arm64(aarch64) code inject☆39Updated 9 years ago
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆113Updated 10 years ago
- Inspector server for android☆47Updated last year
- StormHook is a Android Hook Framework for Dalvik and Art☆114Updated 7 years ago
- Android application hooking tool based on VirtualHook/VirtualApp☆26Updated 4 years ago
- Native IO Redirect implementation for Android.☆73Updated 8 years ago
- ElfHooK, reference with boyliang's AllHookInOne project, fix bugs, support android 5/6/7 and aarch64☆29Updated 2 years ago
- search all symbal in ELF file(dlsym can not find)☆28Updated 5 years ago
- ☆21Updated 9 years ago
- The demo source of injection_by_ptrace☆61Updated 10 years ago
- ☆14Updated 8 years ago
- ☆58Updated 7 years ago
- GOT Hook implemented in Android☆74Updated 7 years ago
- OAT AXML ARSC Template for 010Editor☆76Updated 7 years ago
- ☆39Updated 7 years ago
- inotifywait for Android☆101Updated 9 years ago
- This project contains several exercises about injection using ptrace on Android platform☆65Updated 8 years ago
- android so inject for arm64☆23Updated 9 years ago
- Enhanced dlfunctions, look up symbol in both .dynsym and .symtab☆49Updated 5 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆86Updated 9 years ago
- ☆67Updated 6 years ago
- ☆11Updated 8 years ago
- ☆72Updated 5 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆59Updated 9 years ago