maaaaz / jnianalyzer
A simple tool to help finding JNI calls in a x86/ARM disassembly listing
☆80Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for jnianalyzer
- some idapython scripts for android debugging.☆44Updated 7 years ago
- All You Need For Ida Pro And Android Debugging☆62Updated 9 years ago
- A libparse implementation of a Dex parser☆22Updated 11 years ago
- Android Injector☆23Updated 7 years ago
- A runtime patching library for Android.☆20Updated 7 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆81Updated 11 months ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆45Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- Android Library Code Recognition☆78Updated 6 months ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- ARM Shellcode Generator☆104Updated 7 years ago
- Configurable, flexible regex-based APK modification tool.☆35Updated 7 years ago
- Android app for demonstrating native library harnessing☆41Updated 5 years ago
- ELF header abuse☆46Updated 8 years ago
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago
- The Android Runtime Instrumentation Toolkit☆23Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆92Updated 8 years ago
- AndroidSubstrate_hookingC_examples☆55Updated 9 years ago
- Extracting the strings from the .dex files with meaning.☆11Updated 7 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Utility to read custom structure from Tencent's libshell packer☆37Updated 5 years ago
- gdb plugin for android debugging☆103Updated 8 years ago
- CVE-2015-3636 exploit☆43Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆97Updated 7 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 7 years ago