nccgroup / assethook
LD_PRELOAD magic for Android's AssetManager
☆78Updated 2 years ago
Alternatives and similar repositories for assethook:
Users that are interested in assethook are comparing it to the libraries listed below
- JNI Helper Plugin☆52Updated 5 months ago
- Android OAT Plugin for JEB☆47Updated last year
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- ☆31Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- The dexdump tool☆17Updated 11 years ago
- JEB Scripts☆21Updated 10 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Updated 11 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- ☆22Updated 6 years ago
- Android app for demonstrating native library harnessing☆42Updated 6 years ago
- write-what-where plus heap address leaking in OMX☆37Updated 9 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- some idapython scripts for android debugging.☆44Updated 7 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 9 years ago
- CVE-2015-3636 exploit☆44Updated 9 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆82Updated last year
- Dex manipulation library☆103Updated 9 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- Android Library Code Recognition☆80Updated last year