i64 / androidDump
A tool pulls loaded binaries ordered by memory regions
☆33Updated 4 years ago
Related projects: ⓘ
- ☆26Updated 4 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago
- ☆18Updated 5 years ago
- cve-2019-11931☆35Updated 4 years ago
- Android Malware Tracker☆26Updated 5 months ago
- Frida FDE bruteforce Samsung S7 Edge☆46Updated 4 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆31Updated 6 years ago
- ☆28Updated 6 years ago
- A smali emulator.☆23Updated 6 years ago
- Frida script to bypass ssl Pinning☆44Updated 2 years ago
- ☆27Updated 3 years ago
- IDA, Ghidra and Radare2 scripts. Also Android scripts to make your life easier.☆46Updated 5 years ago
- ☆45Updated 7 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 3 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Updated 6 years ago
- ☆32Updated 4 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆9Updated 4 years ago
- ☆24Updated 6 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 6 years ago
- Android privilege escalation via an use-after-free in binder.c☆37Updated 4 years ago
- BlazeFox Exploit☆18Updated 5 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆17Updated 4 years ago
- Apk infector && Frida injector☆21Updated last month
- poxyran's blog☆11Updated 4 years ago
- Android Hacking Event 2017 Write-up☆44Updated 7 years ago
- ☆48Updated this week
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 2 years ago