gast04 / JDB-plus-plusLinks
JDB++ an jdb extension for easily debugging through smali code
☆23Updated 4 years ago
Alternatives and similar repositories for JDB-plus-plus
Users that are interested in JDB-plus-plus are comparing it to the libraries listed below
Sorting:
- Utility to read custom structure from Tencent's libshell packer☆38Updated 6 years ago
- A collection of secRet frida scripts☆64Updated 4 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆19Updated 5 years ago
- ☆72Updated 3 years ago
- JNI Helper Plugin☆53Updated 6 months ago
- ☆32Updated 5 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 5 years ago
- ☆28Updated 5 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆83Updated 5 years ago
- A small utilities to scan process memory and search patterns using frida with a single line of command☆21Updated 3 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Updated 3 years ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- Android Library Code Recognition☆80Updated last year
- A basic android pentest environment to instrument apps without root or repackaging an app☆67Updated 4 years ago
- ☆21Updated last year
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- Android library for detecting Android virtual containers.☆69Updated 4 years ago
- Android application tracer powered by Frida☆78Updated 5 years ago
- ☆31Updated 2 years ago
- Repository of code I've written during my twitch stream, "F'ing Around with Binary Ninja"☆107Updated 4 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆29Updated 4 years ago
- Examples of the obfuscated APKs (using manifesto and/or other techniques)☆29Updated 10 years ago
- Official Dexcalibur documentation☆16Updated 4 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 7 years ago
- Some crackme i built for Android☆12Updated 5 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Updated 2 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago