rednaga / URLSnifferLinks
Simple xposed module to sniff urls from java.net.URL
☆19Updated 10 years ago
Alternatives and similar repositories for URLSniffer
Users that are interested in URLSniffer are comparing it to the libraries listed below
Sorting:
- ☆69Updated 11 years ago
- http://forum.xda-developers.com/xposed/modules/mod-advanced-logging-t3472533☆24Updated 5 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆104Updated 8 years ago
- JEB Scripts☆21Updated 11 years ago
- Deckard performs static and dynamic binary analysis on Android APKs to extract Xposed hooks☆81Updated 3 years ago
- Configurable, flexible regex-based APK modification tool.☆37Updated 8 years ago
- ARTist's deployment application, for code-injection on an Android device.☆39Updated 6 years ago
- ☆28Updated 8 years ago
- Bypass signature and permission checks for IPCs☆85Updated 12 years ago
- Some xposed modules☆16Updated 7 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Updated 5 years ago
- AAMO: Another Android Malware Obfuscator☆125Updated 10 years ago
- LD_PRELOAD magic for Android's AssetManager☆81Updated 3 years ago
- All You Need For Ida Pro And Android Debugging☆63Updated 10 years ago
- Android small footprint inspection tool☆110Updated 11 years ago
- Xposed module for obtaining SQLCipher crypto keys☆39Updated 8 years ago
- Android application tracer powered by Frida☆79Updated 5 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- An offline documentation browser for Smali☆16Updated 6 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Updated 10 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- This will help u inject a so file or dex file to zygote,and zygote still run normally.☆23Updated 10 years ago
- Android Library Code Recognition☆83Updated last year
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 5 years ago
- Lazenca A - Android Memory Cheat Tool(Engine)☆32Updated 8 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆66Updated 5 years ago
- A tool pulls loaded binaries ordered by memory regions☆35Updated 6 years ago
- Easily create a Xposed Module with Android Studio☆79Updated 6 years ago
- Make any application debuggable☆136Updated 12 years ago
- Android Unpacking Automation using Corellium Devices☆136Updated last month