poorevil / GetAPKDetails
获取apk应用所有详细信息,python实现
☆76Updated 11 years ago
Related projects: ⓘ
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆111Updated 9 years ago
- 通过Xposed框架hook android的敏感函数,具体参考https://github.com/halfkiss/ZjDroid, 并添加了相应的函数☆72Updated 5 years ago
- Make fake location information to wechat using xposed framework☆49Updated 9 years ago
- Cydia Substrate demo, hook getExternalStorageState, always return MOUNTED status.☆143Updated 10 years ago
- Automatic Unpacking Tool for Android Dex Files☆144Updated 8 years ago
- ☆137Updated this week
- Fork From BaiduSecurityLabs/ZjDroid.☆27Updated 8 years ago
- ☆72Updated 9 years ago
- Android Debugging Library☆63Updated 10 years ago
- ☆69Updated this week
- ☆33Updated this week
- A plugin based on Xposed framework, help you auto get wechat lucky money, I'll try my best to update it☆52Updated 8 years ago
- Android Apk查壳工具及源代码☆228Updated 7 years ago
- 基于Xspoed的微信猜拳、骰子点数作弊插件!☆27Updated 8 years ago
- ☆18Updated this week
- 从oat文件中dump出来dex的工具☆140Updated 8 years ago
- 使用cydia substrate框架hook android的关键api,实时记录观察app后台运行时所调用的所有敏感函数,并生成json日志输出☆69Updated 7 years ago
- 通付盾第一代安全加固方案☆165Updated 9 years ago
- ☆62Updated this week
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆85Updated 8 years ago
- 解析Android中的arsc文件格式☆83Updated 7 years ago
- ☆41Updated 10 years ago
- ☆25Updated 8 years ago
- ☆60Updated this week
- apimonitor ZjDroid是基于Xposed Framewrok的动态逆向分析模块,逆向分析者可以通过ZjDroid完成以下工作: DEX文件的内存dump 基于Dalvik关键指针的内存BackSmali,有效破解加固应用 敏感API的动态监控 指定内存区域数…☆56Updated 8 years ago
- Android 平台 加固方案☆39Updated 9 years ago
- android inject and hook demo☆27Updated 9 years ago
- WechatForwarder module for xposed ,generated by reversing engineering from WechatForwarder by fkzhang☆30Updated 8 years ago
- ☆83Updated this week
- 解析Android中so文件格式☆88Updated 7 years ago