google / smaliLinks
☆277Updated last month
Alternatives and similar repositories for smali
Users that are interested in smali are comparing it to the libraries listed below
Sorting:
- Android binary resources read/write library☆281Updated this week
- Generate dex file by c++☆170Updated 3 months ago
- 🎇 AOT compiler to translate dalvikvm code into cpp code☆252Updated last week
- Java Xposed Api for LSPlant☆156Updated 2 months ago
- This is a tool used to modify Android Manifest binary file.☆368Updated 2 months ago
- String obfuscator for Android applications☆342Updated last month
- A dex analyzer for finding obfuscated codes dynamically☆97Updated last year
- Modify Android linker to provide loading module and hook function☆425Updated 3 weeks ago
- ☆333Updated last year
- Android VM injection and BinderJacking sample code, and some ramblings about root☆236Updated 6 years ago
- ☆109Updated last year
- Bypass APK Signatures Verify & Integrity Check using Reflection☆365Updated 9 months ago
- The axml components for reading binary Android XML files in Soot☆80Updated 4 months ago
- https://5ec1cff.github.io/my-blog☆312Updated last year
- Android API restriction bypass for all Android Versions☆685Updated last year
- Public researchings of the Google's Android apps protection☆241Updated 6 months ago
- toggle app debuggable☆330Updated 4 months ago
- Tools to work with android .dex and java .class files☆260Updated 2 months ago
- xDL is an enhanced implementation of the Android DL series functions.☆515Updated this week
- A hook framework for Android Runtime (ART)☆1,036Updated 3 weeks ago
- A way to detect magisk hide using an Android feature☆213Updated 3 years ago
- A Gradle plugin that improves the experience when developing Android apps, especially system tools, that use hidden APIs.☆291Updated last year
- A binder interceptor framework for Android☆323Updated 11 months ago
- ☆212Updated 8 months ago
- Lightweight ARMv8-A(ARM64, AArch64, Little-Endian) Inline Hook Library for Android C/C++☆678Updated 2 years ago
- ☆178Updated 6 months ago
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆194Updated 2 years ago
- PoC of injecting zygote processes by replacing system native bridge support☆153Updated 4 years ago
- Is a protect Android App anti any attacks and environments.☆341Updated last year
- encode xml to axml AND decode axml to xml--Hack Android Manifest easily☆279Updated 3 years ago