Native Android software for dumping memory from Android processes
☆14Sep 18, 2014Updated 11 years ago
Alternatives and similar repositories for aprocdump
Users that are interested in aprocdump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Aug 18, 2017Updated 8 years ago
- SIM Card Forensic Acquisition using USB to Serial readers☆38Sep 17, 2014Updated 11 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Oct 12, 2018Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- Library that allows you to run 64bit code on a Wow64 32bit process☆148May 17, 2017Updated 8 years ago
- Mobile Forensic Academic Articles☆13Jun 8, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆24Mar 1, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Experimental CMake with D support☆16Apr 2, 2015Updated 10 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Python script for cracking and generating Android locks☆66Jul 10, 2023Updated 2 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Additional Material for the Mobile Forensics Course☆18Jul 10, 2020Updated 5 years ago
- D component library☆12Aug 15, 2015Updated 10 years ago
- Custom Kernel for Samsung Galaxy Note 9 running Samsung Firmware (Pie 9.0)☆13Mar 11, 2020Updated 6 years ago
- Python scripts for doing Android or IOS mobile forensics☆26Sep 28, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A fairly reusable sample express app designed to be the backend of both the web and mobile examples.☆11Jun 19, 2018Updated 7 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 12 years ago
- A c++, QT gui based memory engine☆13Mar 6, 2018Updated 8 years ago
- A flying and rock-shooting game☆17Oct 14, 2021Updated 4 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Nov 4, 2011Updated 14 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Aug 13, 2015Updated 10 years ago
- A simple UITableView example implemented with RxSwift and RxDataSources.☆12Feb 10, 2016Updated 10 years ago
- ☆11Sep 14, 2014Updated 11 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- Glacier is a type annotation extension to Java that enforces transitive class immutability.☆14Nov 15, 2021Updated 4 years ago
- Fork of JFlex (https://github.com/jflex-de/jflex) used in IntelliJ Platform☆17Oct 23, 2025Updated 5 months ago
- Extends the CircleCI REST API with bookmarkable URLs for latest build and build artifacts☆10Jan 11, 2016Updated 10 years ago