huuck / KatalinaLinks
Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.
☆159Updated 2 years ago
Alternatives and similar repositories for Katalina
Users that are interested in Katalina are comparing it to the libraries listed below
Sorting:
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- ☆93Updated 3 years ago
- Some Of Anti-Frida Stuff☆127Updated 3 years ago
- AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Goog…☆208Updated 2 years ago
- Miscellaneous code☆109Updated 5 months ago
- Python API Monitor for Android apps☆83Updated last year
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆102Updated 3 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆358Updated 2 years ago
- Frida hook generator for Ghidra☆126Updated 3 months ago
- xVision is a plugin for the JadX decompiler that aims to integrate with Large Language Models (LLMs) to provide code analysis directly in…☆64Updated 7 months ago
- Files used to resolve the r2pay challenge☆54Updated 5 years ago
- My own collection of Frida scripts and tricks☆69Updated 4 years ago
- A place to reborn☆60Updated 3 years ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆102Updated last year
- Defeat Java packers via Frida instrumentation☆208Updated 3 weeks ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆185Updated last year
- Dynamic injection tool for Linux/Android☆191Updated 11 months ago
- Inspect and instrument React Native applications at runtime☆96Updated last year
- Contains all the scripts and sample apps related to android in app protections.☆38Updated last month
- ☆57Updated 2 years ago
- mobile reverse engineering framework☆50Updated last week
- ☆62Updated last year
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆143Updated this week
- Frida: callback based hooking of Java classes loaded at runtime☆35Updated 2 years ago
- ☆128Updated 2 years ago
- ☆30Updated 3 years ago
- Property extractor for Android apps☆307Updated 9 months ago
- CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)☆69Updated last year
- DroidGuard VM Samples☆66Updated 3 years ago
- Plugins for reversing android apps in JEB☆77Updated last year