nelenkov / gdrive-appdata
Fetch Android appdata/ from Google Drive
☆72Updated 4 years ago
Alternatives and similar repositories for gdrive-appdata:
Users that are interested in gdrive-appdata are comparing it to the libraries listed below
- Look for interesting things in an APK and inject logging☆47Updated 11 years ago
- Vulnerability Reports by Aleph Research☆36Updated 11 months ago
- SafetyNet Jar download & extractor utility☆36Updated 7 years ago
- command line tools using the node-google-play library☆75Updated 6 years ago
- Android bootloader (aboot) parser☆61Updated 10 months ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆77Updated 2 years ago
- Brute force and decryption of Android's Full Device Encryption☆66Updated 11 years ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆26Updated 7 years ago
- Collaborative Knowledgebase base where people can contribute to Android Tamer☆19Updated 2 years ago
- Check Android device security settings☆85Updated 5 years ago
- Binaries compiled for ARM☆70Updated 7 years ago
- repo with compromised keys and such☆20Updated 2 years ago
- QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)☆118Updated 5 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Updated 4 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 3 years ago
- Unpacks the Motorola motoboot.img binary☆20Updated 9 years ago
- Google Play checkin utility. Creates a configurable hardware profile and gets a GSF ID for it.☆64Updated 7 years ago
- A local Android DoS Exploit for API 29 and API 30☆60Updated 2 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆40Updated 2 years ago
- This module configures the chrome flag --ignore-certificate-errors-spki-list, this bypasses the NET::ERR_CERTIFICATE_TRANSPARENCY_REQUIRE…☆31Updated 2 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆11Updated 2 years ago
- Filesystem/Binary Image Parser, Command Line Only☆29Updated 11 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆163Updated 7 years ago
- ☆13Updated 3 years ago
- Rooting Android Studio Emulator with Android Version 9.0 and above☆53Updated 4 years ago
- Tool used for dumping memory from Android devices☆68Updated 9 years ago
- ☆104Updated 3 years ago
- Source code and tools of the original Mobile-Sandbox release (outdated)☆22Updated 9 years ago
- Unofficial port of setools to Android☆27Updated 7 years ago
- Qualcomm TrustZone kernel privilege escalation☆63Updated 8 years ago