hrkfdn / deckard
Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks
☆77Updated 2 years ago
Related projects: ⓘ
- Java-layer Android Malware Simplifier☆25Updated 2 years ago
- SafetyNet Jar download & extractor utility☆35Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆93Updated 7 years ago
- A set of JEB Python/Java scripts for reverse engineering Android obfuscated code☆129Updated 8 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆42Updated 3 years ago
- Android library for detecting Android virtual containers.☆67Updated 3 years ago
- http://forum.xda-developers.com/xposed/modules/mod-advanced-logging-t3472533☆23Updated 4 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆205Updated 10 years ago
- Android Library Code Recognition☆77Updated 4 months ago
- An app intended for fuzzing the Android Binder interface and System Services☆84Updated 4 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 3 years ago
- Resources of the "Dissecting mobile native code packers. A case study." Zimperium's blogpost.☆88Updated 6 years ago
- ☆73Updated 4 years ago
- Dump Android Verified Boot Signature☆52Updated 5 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆56Updated 4 years ago
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- Android rootkit☆40Updated 8 years ago
- Configurable, flexible regex-based APK modification tool.☆35Updated 7 years ago
- JNI Helper Plugin☆52Updated 3 years ago
- Automated Frida hook generation with JEB☆140Updated last year
- sud - a su daemon for corellium devices☆25Updated 2 years ago
- All You Need For Ida Pro And Android Debugging☆62Updated 9 years ago
- You are probably looking for: https://github.com/ViRb3/magisk-frida☆57Updated 2 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆34Updated last year
- Modify Android applications at source-level in Android Studio☆83Updated 4 years ago
- Simple xposed module to sniff urls from java.net.URL☆18Updated 9 years ago
- Unofficial port of setools to Android☆26Updated 7 years ago
- Easily create a Xposed Module with Android Studio☆76Updated 5 years ago
- ☆68Updated this week