kerastinell / imgtoolLinks
Utilitiy for working with Android firmware .img files
☆35Updated 6 years ago
Alternatives and similar repositories for imgtool
Users that are interested in imgtool are comparing it to the libraries listed below
Sorting:
- A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )☆117Updated 7 years ago
- Tool to decompile & extract Android Dex bytecode from Vdex files☆20Updated 3 years ago
- PoC of injecting zygote processes by replacing system native bridge support☆157Updated 4 years ago
- A powerful tool to dump dex files whose instructions are replaced with nop☆59Updated 5 years ago
- Loadable Kernel Module for Android☆76Updated 5 years ago
- search all symbal in ELF file(dlsym can not find)☆36Updated 6 years ago
- Run arbitrary code by patching OAT files☆93Updated last year
- Multi-dex extensions for dexlib2☆71Updated 2 years ago
- cdex to dex binarys☆39Updated 6 years ago
- Magisk Module with strace☆33Updated 4 years ago
- Extractor: The Android firmware image extraction tool☆103Updated last year
- Builds a TWRP compatible zip that installs EdXposed framework straight to system partition without installing root tools☆42Updated 4 years ago
- Blog https://blog.omitol.com☆28Updated 4 months ago
- ☆55Updated 8 months ago
- Run command with specific selinux context for Android☆19Updated 2 years ago
- BTFHub, but for Android☆38Updated last year
- A simple cli tool to monitor the file opening of application processes.☆30Updated 3 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 9 years ago
- Android eBPF sample☆47Updated 3 years ago
- Trace jni calls with eBPF on Android☆24Updated 3 years ago
- Precompiled tcpdump binaries for Android☆56Updated 4 years ago
- ☆85Updated 3 years ago
- Dump Android Verified Boot Signature☆63Updated 6 years ago
- ☆67Updated last month
- Two ways to detect Magisk v23.0 and older. Magisk v24+ users won't be affected. OLD VERSIONS WERE BUGGY, UPGRADE YOUR MAGISK.☆203Updated 2 years ago
- ☆60Updated 7 years ago
- Bypass dynamic linking function restriction on Android by forging caller address☆41Updated 3 years ago
- This will help u inject a so file or dex file to zygote,and zygote still run normally.☆23Updated 9 years ago
- Android VM injection and BinderJacking sample code, and some ramblings about root☆242Updated 6 years ago
- Slim dockerized Android ndk☆12Updated 2 years ago