nccgroup / assethook
LD_PRELOAD magic for Android's AssetManager
☆78Updated 2 years ago
Alternatives and similar repositories for assethook:
Users that are interested in assethook are comparing it to the libraries listed below
- Android OAT Plugin for JEB☆46Updated last year
- JNI Helper Plugin☆52Updated 3 months ago
- Miscellaenous DEX (Dalvik Executable) tools☆82Updated last year
- ☆31Updated 8 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 9 years ago
- Dex manipulation library☆101Updated 9 years ago
- JEB Scripts☆20Updated 10 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆40Updated 7 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆118Updated 10 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- Android Library Code Recognition☆79Updated 10 months ago
- A portable utility to locate android binder service☆92Updated 5 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆42Updated 6 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 7 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- Make any application debuggable☆131Updated 11 years ago
- An Android port of the melkor ELF fuzzer☆60Updated 10 years ago
- Python script to create an Android APK exploiting the Janus vulnerability.☆83Updated 7 years ago
- slide and full exploit☆86Updated 4 years ago
- My slides☆89Updated 5 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- Shim to grab keystore backed data☆27Updated 7 years ago
- All You Need For Ida Pro And Android Debugging☆62Updated 9 years ago