mmcloughlin / reprotobufLinks
Reverse engineer protobuf from javanano
☆29Updated 8 years ago
Alternatives and similar repositories for reprotobuf
Users that are interested in reprotobuf are comparing it to the libraries listed below
Sorting:
- Google Play API for Python☆62Updated 6 months ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆39Updated 9 years ago
- A "shim" for loading native jni files for Android active debugging☆180Updated 2 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Updated 7 years ago
- Android bootloader (aboot) parser☆63Updated last year
- Qualcomm TrustZone kernel privilege escalation☆65Updated 9 years ago
- Library for downloading APK files from the Google Play store☆64Updated 6 years ago
- Result of the Android security research☆17Updated 8 years ago
- Client-side collector for the Android Census☆16Updated last year
- SELinux Policy Analysis Tools v4 alpha☆36Updated 8 years ago
- SafetyNet Jar download & extractor utility☆37Updated 7 years ago
- Look for interesting things in an APK and inject logging☆47Updated 12 years ago
- ☆32Updated 9 years ago
- Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass☆78Updated 7 years ago
- Class to help with adding logging function in smali output from 3rd party Android apps.☆78Updated 8 years ago
- A collection of custom scripts for use with Hopper disassembler☆24Updated 10 years ago
- Inspect and manipulate UIKit-based GUIs through Frida.☆59Updated last month
- Lightweight version of xpwntool just for decrypting IMG3 firmware files☆47Updated 4 years ago
- radare2-lldb integration☆62Updated 6 years ago
- A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.☆88Updated 8 years ago
- Doyensec theme for the Hopper Disassembler - chill and functional for long RE nights☆55Updated 8 years ago
- IDA PRO plugins, scripts and loaders for mbn and sbl bootloader formats☆22Updated 9 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆23Updated 2 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- Samsung Remote Code Execution as System User☆125Updated 8 years ago
- Android anti-root detection Proof of Concept☆43Updated 10 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 9 years ago
- tool to inspect, dump, modify, search and inject libraries into Android processes.☆125Updated 8 years ago
- Google Play checkin utility. Creates a configurable hardware profile and gets a GSF ID for it.☆64Updated 8 years ago
- android kernel disassembler based on MAME emulator code☆39Updated 11 years ago