hugo-glez / dexstringsLinks
Extracting the strings from the .dex files with meaning.
☆12Updated 8 years ago
Alternatives and similar repositories for dexstrings
Users that are interested in dexstrings are comparing it to the libraries listed below
Sorting:
- Configurable, flexible regex-based APK modification tool.☆37Updated 8 years ago
- Android OAT Plugin for JEB☆48Updated 2 years ago
- Parse and tamper DEX file☆17Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 10 years ago
- Android Injector☆22Updated 9 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆43Updated 7 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- Android Library Code Recognition☆83Updated last year
- a set of tools/scripts to obfuscate and manipulate dex files☆118Updated 10 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- ☆41Updated 8 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 10 years ago
- Android app for demonstrating native library harnessing☆42Updated 7 years ago
- Android sandboxing (ptrace based)☆14Updated 10 years ago
- write-what-where plus heap address leaking in OMX☆36Updated 9 years ago
- An Android port of the melkor ELF fuzzer☆62Updated 11 years ago
- Extract DEX files from an ART ELF binary☆41Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆25Updated 9 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 10 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- ☆12Updated 8 years ago
- A very rudimentary Android DEX file parser☆65Updated 11 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Updated 10 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆77Updated 10 years ago
- ☆27Updated 9 years ago
- mtkfb exploit for mt658x & mt6592☆35Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- PoC framework for APK obfuscation☆52Updated 10 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago