InHouse safetynet killer
☆31Jun 23, 2019Updated 6 years ago
Alternatives and similar repositories for SNetKiller
Users that are interested in SNetKiller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android sample project using DroidGuard native library☆13Apr 11, 2019Updated 6 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- ☆18Jul 15, 2020Updated 5 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- FinSpy for Android technical analysis and tools☆63Oct 25, 2020Updated 5 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆48Jul 24, 2021Updated 4 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Mar 25, 2018Updated 8 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- ☆76Jul 9, 2017Updated 8 years ago
- JNI Helper Plugin☆54Dec 5, 2024Updated last year
- A collection of secRet frida scripts☆66Jan 8, 2021Updated 5 years ago
- ☆32Nov 6, 2019Updated 6 years ago
- A part of the project to detect Magisk on an Android device☆11May 13, 2019Updated 6 years ago
- Automated Frida hook generation with JEB☆152Jun 3, 2023Updated 2 years ago
- ☆30Mar 7, 2022Updated 4 years ago
- SSL Pinning bypass using frida server for Mobile Application Penetration Testing☆15Jan 6, 2021Updated 5 years ago
- Dump process memory with FRIDA.☆16Feb 29, 2024Updated 2 years ago
- Runs frida-server on boot as root with magisk.☆216May 22, 2023Updated 2 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Jul 8, 2019Updated 6 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- Frida module to hook module initializations on android☆68Jan 4, 2021Updated 5 years ago
- Instructions tracing powered by frida☆183Jul 8, 2019Updated 6 years ago
- zipalign library for Android projects. Use ARSCLib instead: https://github.com/REAndroid/ARSCLib☆15Apr 13, 2023Updated 2 years ago
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.☆22Apr 18, 2020Updated 5 years ago
- PoC Frida script to view Android libbinder traffic☆141Jul 27, 2024Updated last year
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- Build an .so file to automatically do the android_native_hook work. Supports ARM64 ! With this, tools like Xposed can do android native h…☆286Oct 3, 2018Updated 7 years ago
- Dwarf script to collect network requests and display on data panel☆21Mar 4, 2020Updated 6 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- Result of the Android security research☆17Feb 16, 2017Updated 9 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- use frida monitoring android app☆48Sep 26, 2018Updated 7 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Jul 19, 2017Updated 8 years ago
- Detecting repackaged magisk in less than a second☆21Jul 8, 2019Updated 6 years ago
- Script to quickly hook natives call to JNI in Android☆627Aug 3, 2023Updated 2 years ago
- PoC to bypass Android restrictions☆217Mar 27, 2019Updated 6 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- A Pawn p-code interpreter written in C++☆27Oct 13, 2022Updated 3 years ago
- Notes for my video on running an ARM64 Android emulator in Azure☆40Jul 19, 2024Updated last year