rednaga / keystore-shim
Shim to grab keystore backed data
☆27Updated 7 years ago
Alternatives and similar repositories for keystore-shim
Users that are interested in keystore-shim are comparing it to the libraries listed below
Sorting:
- An Android port of the melkor ELF fuzzer☆61Updated 10 years ago
- ☆22Updated 6 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- JEB Scripts☆21Updated 10 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Updated 7 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- CVE-2014-4322 Exploit☆24Updated 9 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Android OAT Plugin for JEB☆47Updated last year
- linux version (rewrite in Python)☆29Updated 10 years ago
- SELinux Policy Analysis Tools v4 alpha☆36Updated 8 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Updated 6 years ago
- android apk查壳工具源代码☆17Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- Configurable, flexible regex-based APK modification tool.☆36Updated 7 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18Updated 4 years ago
- Get symbol address and name from tables for kallsyms☆31Updated 9 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- ☆31Updated 9 years ago
- CVE-2013-2596 exploit for android☆14Updated 11 years ago
- ELF header abuse☆48Updated 9 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- The Android Runtime Instrumentation Toolkit☆24Updated 8 years ago
- Extracting the strings from the .dex files with meaning.☆12Updated 7 years ago
- PoC framework for APK obfuscation☆52Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆98Updated 7 years ago
- Contains many different ways to identify hostile environments.☆63Updated 9 years ago
- reversing mtk-su☆17Updated 5 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- Generic exploit for master key vulnerability in Android☆33Updated 10 years ago