retme7 / FakeID_poc_by_retme_bug_13678484Links
PoC binary file of FakeID,with some source code
☆46Updated 11 years ago
Alternatives and similar repositories for FakeID_poc_by_retme_bug_13678484
Users that are interested in FakeID_poc_by_retme_bug_13678484 are comparing it to the libraries listed below
Sorting:
- a set of tools/scripts to obfuscate and manipulate dex files☆118Updated 10 years ago
- inotifywait for Android☆104Updated 10 years ago
- Android Unpack tool based on Cydia☆92Updated 7 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆129Updated 10 years ago
- restart adbd with root privileges☆166Updated 8 years ago
- Make any application debuggable☆134Updated 11 years ago
- walk into Android security step by step☆101Updated 7 years ago
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆112Updated 10 years ago
- Xposed Module to automatically unpack Apk☆161Updated 8 years ago
- AndroidSubstrate_hookingC_examples☆56Updated 10 years ago
- Extended oatdump from AOSP platform/art repo☆136Updated 8 years ago
- POC of packing app(only dalvik supported)--Decrypt code on the fly☆52Updated 10 years ago
- A demo to show how to install Xposed and enable Xposed based module automatically☆29Updated 11 years ago
- Various Jeb plugins, including obfuscation restore☆92Updated 9 years ago
- Example of obfuscating an Android NDK project using O-LLVM☆218Updated 11 years ago
- Parse and tamper DEX file☆17Updated 8 years ago
- Cmd line tool to repair Android DEX bytecode files CRC checksum☆43Updated 7 years ago
- A runnable jar that generate Javascript hook script to hook Android classes.☆137Updated 7 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 8 years ago
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆149Updated 10 years ago
- An android hook tools based on cydia substrate☆27Updated 9 years ago
- Bypass signature and permission checks for IPCs☆84Updated 11 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆86Updated 9 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆77Updated 10 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 10 years ago
- a poc of Android bug 17356824☆55Updated 10 years ago
- This tool is used to extract dex files from oat file.☆167Updated 8 years ago
- Android OAT Plugin for JEB☆48Updated 2 years ago
- OAT AXML ARSC Template for 010Editor☆77Updated 8 years ago
- AndroidManifest Binary Editor☆120Updated 9 years ago