intrepidusgroup / IGLogger
Class to help with adding logging function in smali output from 3rd party Android apps.
☆77Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for IGLogger
- Look for interesting things in an APK and inject logging☆47Updated 11 years ago
- Android File Fuzzing Framework☆85Updated 2 years ago
- Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.☆80Updated 8 years ago
- GUI for Frida -Scripts☆174Updated 8 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆81Updated 11 months ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆124Updated 8 years ago
- ☆64Updated last year
- Python script to create an Android APK exploiting the Janus vulnerability.☆81Updated 6 years ago
- ☆91Updated 7 years ago
- android apk查壳工具源代码☆17Updated 9 years ago
- Check Android device security settings☆83Updated 5 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- Android application tracer powered by Frida☆78Updated 4 years ago
- SEAndroid Analytics Library for live device analysis☆58Updated 5 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆94Updated 9 years ago
- Find broken SSL certificate validation in Android Apps☆63Updated last year
- A place for disclosing things☆42Updated 8 years ago
- Public presentations given on Frida at conferences☆101Updated 5 years ago
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Updated 9 years ago
- Android Loadable Kernel Modules - mostly used for reversing and debugging on controlled systems/emulators☆205Updated 10 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆97Updated 7 years ago
- Runtime memory analysis framework to identify Android malware☆142Updated 6 years ago
- An Online Analysis System for Packed Android Malware☆109Updated 8 years ago
- Black box tool to bypass SSL verification on Android, even when pinning is used.☆317Updated 11 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆102Updated 9 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆74Updated 8 years ago
- CVE-2014-3153 aka towelroot☆120Updated 7 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago