msg555 / dxcut
A library for reading, manipulating, and writing dex (and odex) files.
☆15Updated 12 years ago
Alternatives and similar repositories for dxcut:
Users that are interested in dxcut are comparing it to the libraries listed below
- Parse and tamper DEX file☆18Updated 8 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- Android Injector☆23Updated 8 years ago
- Android OAT Plugin for JEB☆47Updated last year
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- ☆14Updated 9 years ago
- A libparse implementation of a Dex parser☆22Updated 11 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆40Updated 8 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- Various Jeb plugins, including obfuscation restore☆15Updated 9 years ago
- ☆12Updated 7 years ago
- JEB Scripts☆21Updated 10 years ago
- Extracting the strings from the .dex files with meaning.☆12Updated 7 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- LD_PRELOAD magic for Android's AssetManager☆78Updated 2 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- Dex manipulation library☆103Updated 9 years ago
- ElfHooK, reference with boyliang's AllHookInOne project, fix bugs, support android 5/6/7 and aarch64☆30Updated 2 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆118Updated 10 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 11 years ago
- JNI Helper Plugin☆52Updated 4 months ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆43Updated 6 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago