PoC to bypass Android restrictions
☆217Mar 27, 2019Updated 6 years ago
Alternatives and similar repositories for android-restriction-bypass
Users that are interested in android-restriction-bypass are comparing it to the libraries listed below
Sorting:
- ☆40Sep 5, 2021Updated 4 years ago
- Automated Frida hook generation with JEB☆152Jun 3, 2023Updated 2 years ago
- Scripts to unpack APK protected by Legu☆215Apr 11, 2023Updated 2 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆48Jul 24, 2021Updated 4 years ago
- ☆32Nov 6, 2019Updated 6 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- PoC Frida script to view Android libbinder traffic☆141Jul 27, 2024Updated last year
- Frida module to hook module initializations on android☆68Jan 4, 2021Updated 5 years ago
- ☆76Jul 9, 2017Updated 8 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,121Feb 2, 2023Updated 3 years ago
- ☆20Mar 13, 2018Updated 8 years ago
- Instructions tracing powered by frida☆183Jul 8, 2019Updated 6 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆164May 26, 2020Updated 5 years ago
- this unpack script for Android O and Android P☆310Dec 3, 2019Updated 6 years ago
- Some frida scripts☆142Aug 22, 2018Updated 7 years ago
- Tamper detection in Android☆92Mar 27, 2021Updated 4 years ago
- Utility to read custom structure from Tencent's libshell packer☆39Dec 15, 2018Updated 7 years ago
- Android Kernel Exploitation☆642Feb 13, 2022Updated 4 years ago
- Android VM injection and BinderJacking sample code, and some ramblings about root☆255May 20, 2019Updated 6 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Script to quickly hook natives call to JNI in Android☆627Aug 3, 2023Updated 2 years ago
- A Frida based tool that traces usage of the JNI API in Android apps.☆1,817Jul 18, 2023Updated 2 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Oct 1, 2021Updated 4 years ago
- Collection of Android reverse engineering scripts☆424May 3, 2020Updated 5 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Engine used by jnitrace to intercept JNI API calls.☆333Jul 18, 2023Updated 2 years ago
- ☆172Aug 6, 2020Updated 5 years ago
- A collection of secRet frida scripts☆66Jan 8, 2021Updated 5 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆356Jul 21, 2023Updated 2 years ago
- ☆14Feb 6, 2025Updated last year
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- BSides Munich Frida Workshop 2018☆48Aug 8, 2018Updated 7 years ago
- Android API restriction bypass for all Android Versions☆736Sep 29, 2025Updated 5 months ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆139Jan 28, 2021Updated 5 years ago
- Detect Frida for Android☆797Jun 12, 2021Updated 4 years ago
- Android library for detecting Android virtual containers.☆71Dec 12, 2020Updated 5 years ago
- A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more.☆1,574Updated this week