gast04 / JDB-plus-plus
JDB++ an jdb extension for easily debugging through smali code
☆22Updated 3 years ago
Related projects: ⓘ
- Java-layer Android Malware Simplifier☆25Updated 2 years ago
- Android Dex disassembler and Binary Ninja plugin☆52Updated 4 months ago
- ☆32Updated 4 years ago
- Utility to read custom structure from Tencent's libshell packer☆37Updated 5 years ago
- ☆30Updated last year
- A collection of secRet frida scripts☆64Updated 3 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- ☆27Updated 4 years ago
- AndrODet: An Adaptive Android Obfuscation Detector☆31Updated last year
- Android Library Code Recognition☆77Updated 4 months ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 6 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆18Updated 4 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆27Updated 5 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆93Updated 7 years ago
- ☆76Updated 2 years ago
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- ☆63Updated this week
- The radare2 + frida book for Mobile Application assessment☆39Updated 5 years ago
- Higher-level Python interface for frida☆21Updated 5 months ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆63Updated 5 years ago
- a universal and automated unpacking system☆41Updated 6 years ago
- ☆43Updated 2 months ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆21Updated 3 years ago
- just an experiment☆20Updated 6 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆63Updated 4 years ago