Android Data Extractor Lite
☆130May 14, 2015Updated 10 years ago
Alternatives and similar repositories for ADEL
Users that are interested in ADEL are comparing it to the libraries listed below
Sorting:
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Jun 14, 2015Updated 10 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Reversing Google Drive and other goodies ;)☆27Sep 26, 2013Updated 12 years ago
- Open source Android Forensics app and framework☆390Aug 14, 2015Updated 10 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆48Jun 10, 2016Updated 9 years ago
- Simple MIPS32 Emulator (primarily used to run SmallerC compiled for MIPS)☆18Oct 31, 2015Updated 10 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- Tool used for dumping memory from Android devices☆70Jun 12, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- A Program Analysis Toolkit for Android☆121May 25, 2017Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- ☆90Mar 15, 2017Updated 8 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- IDA PRO plugins, scripts and loaders for mbn and sbl bootloader formats☆22Jul 22, 2016Updated 9 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 12 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- A set of IDA Pro scripts to make Tree of Savior client reverse engineering easier☆17Dec 29, 2015Updated 10 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- MD5 algorithm implementation - x86 assembler☆25Mar 15, 2015Updated 10 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- iOS Backup Examiner - A forensics tool for parsing an iOS backup's Info.plist file☆23Dec 5, 2016Updated 9 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago