rednaga / keystore-shim
Shim to grab keystore backed data
☆27Updated 7 years ago
Alternatives and similar repositories for keystore-shim:
Users that are interested in keystore-shim are comparing it to the libraries listed below
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- ☆22Updated 6 years ago
- An Android port of the melkor ELF fuzzer☆59Updated 10 years ago
- Configurable, flexible regex-based APK modification tool.☆35Updated 7 years ago
- linux version (rewrite in Python)☆29Updated 9 years ago
- ☆31Updated 8 years ago
- JEB Scripts☆19Updated 10 years ago
- android apk查壳工具源代码☆17Updated 9 years ago
- Android OAT Plugin for JEB☆46Updated last year
- PoC code for android RCE with multidex and ZIP files☆40Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- PoC code for CVE-2017-13253☆39Updated 4 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 6 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- SEAndroid Analytics Library for live device analysis☆58Updated 5 years ago
- CVE-2014-4322 Exploit☆23Updated 9 years ago
- Get symbol address and name from tables for kallsyms☆32Updated 8 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 7 years ago
- ELF header abuse☆46Updated 8 years ago
- CVE-2014-4321 exploit☆20Updated 9 years ago
- ☆33Updated 9 years ago
- PoC framework for APK obfuscation☆53Updated 9 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 6 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- SafetyNet Jar download & extractor utility☆35Updated 7 years ago
- arbitrary memory read/write by IMemroy OOB☆36Updated 8 years ago
- Vulnerability Reports by Aleph Research☆37Updated 10 months ago
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Updated 6 years ago