retme7 / FakeID_poc_by_retme_bug_13678484Links
PoC binary file of FakeID,with some source code
☆47Updated 11 years ago
Alternatives and similar repositories for FakeID_poc_by_retme_bug_13678484
Users that are interested in FakeID_poc_by_retme_bug_13678484 are comparing it to the libraries listed below
Sorting:
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Updated 9 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- Android Unpack tool based on Cydia☆93Updated 7 years ago
- inotifywait for Android☆105Updated 9 years ago
- restart adbd with root privileges☆165Updated 8 years ago
- AndroidSubstrate_hookingC_examples☆57Updated 10 years ago
- Xposed Module to automatically unpack Apk☆164Updated 8 years ago
- A demo to show how to install Xposed and enable Xposed based module automatically☆29Updated 10 years ago
- walk into Android security step by step☆103Updated 7 years ago
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆113Updated 10 years ago
- Various Jeb plugins, including obfuscation restore☆93Updated 9 years ago
- Extended oatdump from AOSP platform/art repo☆135Updated 7 years ago
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆52Updated 10 years ago
- Make any application debuggable☆134Updated 11 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆43Updated 7 years ago
- Android OAT Plugin for JEB☆48Updated 2 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆85Updated 9 years ago
- Extracting the strings from the .dex files with meaning.☆12Updated 7 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 8 years ago
- Parse and tamper DEX file☆18Updated 8 years ago
- OAT AXML ARSC Template for 010Editor☆77Updated 8 years ago
- A runnable jar that generate Javascript hook script to hook Android classes.☆139Updated 7 years ago
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆150Updated 10 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆78Updated 10 years ago
- Inspector server for android☆47Updated last year
- 使用cydia substrate框架hook android的关键api,实时记录观察app后台运行时所调用的所有敏感函数,并生成json日志输出☆70Updated 8 years ago
- Bypass signature and permission checks for IPCs☆83Updated 11 years ago
- a poc of Android bug 17356824☆55Updated 10 years ago
- A generic DEX file obfuscator and munger☆265Updated 9 years ago
- Dalvik vm Instrumentation OS☆87Updated 9 years ago