hugo-glez / dexstringsLinks
Extracting the strings from the .dex files with meaning.
☆12Updated 8 years ago
Alternatives and similar repositories for dexstrings
Users that are interested in dexstrings are comparing it to the libraries listed below
Sorting:
- Configurable, flexible regex-based APK modification tool.☆37Updated 8 years ago
- Android OAT Plugin for JEB☆48Updated 2 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 10 years ago
- Parse and tamper DEX file☆17Updated 9 years ago
- Android Injector☆23Updated 9 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- Android Library Code Recognition☆83Updated last year
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 12 years ago
- Extract DEX files from an ART ELF binary☆41Updated 9 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- An Android port of the melkor ELF fuzzer☆63Updated 11 years ago
- Android app for demonstrating native library harnessing☆42Updated 7 years ago
- ☆41Updated 8 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆104Updated 8 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆83Updated 2 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆45Updated 7 years ago
- A libparse implementation of a Dex parser☆22Updated 12 years ago
- Shim to grab keystore backed data☆27Updated 8 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 10 years ago
- Various Jeb plugins, including obfuscation restore☆92Updated 9 years ago
- CVE-2014-4322 Exploit☆24Updated 10 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Updated 10 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 8 years ago
- PoC framework for APK obfuscation☆52Updated 10 years ago
- A very rudimentary Android DEX file parser☆65Updated 11 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 10 years ago
- CVE-2015-3636 exploit☆45Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Updated 10 years ago
- LD_PRELOAD magic for Android's AssetManager☆82Updated 3 years ago
- Android sandboxing (ptrace based)☆14Updated 10 years ago