jakev / oat2dex-python
Extract DEX files from an ART ELF binary
☆41Updated 8 years ago
Alternatives and similar repositories for oat2dex-python:
Users that are interested in oat2dex-python are comparing it to the libraries listed below
- An Android port of radamsa fuzzer☆64Updated 5 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Android kernel module to bypass SELinux at boot☆44Updated 8 years ago
- CVE-2014-4322 Exploit☆23Updated 9 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆11Updated 6 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- mtkfb exploit for mt658x & mt6592☆34Updated 9 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆23Updated 11 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆41Updated 7 years ago
- ☆27Updated 8 years ago
- ☆72Updated 9 years ago
- Android Library Code Recognition☆79Updated 9 months ago
- ☆39Updated 7 years ago
- ☆27Updated 8 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- Various Jeb plugins, including obfuscation restore☆15Updated 9 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 8 years ago
- ☆31Updated 8 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- Android Injector☆23Updated 8 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆38Updated 10 years ago
- CVE-2014-4321 exploit☆20Updated 9 years ago
- ☆33Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- ☆38Updated 8 years ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Updated 6 years ago
- reproduce the experiment in the report.☆27Updated 10 years ago