retme7 / launchAnyWhere_poc_by_retme_bug_7699048Links
source code & PoC file of launchAnyWhere problem
☆40Updated 10 years ago
Alternatives and similar repositories for launchAnyWhere_poc_by_retme_bug_7699048
Users that are interested in launchAnyWhere_poc_by_retme_bug_7699048 are comparing it to the libraries listed below
Sorting:
- A portable utility to locate android binder service☆95Updated 5 years ago
- Use black or white list to check if 3rd app have the permission to start the protected Activity☆14Updated 7 years ago
- blabla☆50Updated 4 years ago
- 参考支付宝代码☆45Updated 7 years ago
- IDA plugin, unwind stack trace when debugging arm.☆137Updated 4 years ago
- walk into Android security step by step☆102Updated 6 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆93Updated 9 years ago
- ART tracing research☆91Updated 2 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- PoC of CVE-2022-20474☆17Updated 6 months ago
- ☆62Updated 5 years ago
- dex文件解析工具☆50Updated 8 years ago
- ☆31Updated 9 years ago
- JNI Helper Plugin☆53Updated 8 months ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- OAT AXML ARSC Template for 010Editor☆77Updated 8 years ago
- This tool is used to extract dex files from oat file.☆168Updated 8 years ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 10 years ago
- ☆88Updated 4 years ago
- Android Library Code Recognition☆81Updated last year
- 修复AndroidManifest.xml☆32Updated 9 years ago
- ☆60Updated 8 years ago
- AndroidSubstrate_hookingC_examples☆57Updated 10 years ago
- ☆41Updated 8 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- Draw basic flow diagram of methods in smali file based on unconditional jump and conditional jump instructions.☆34Updated 9 years ago
- Some files which I want to share☆15Updated last year
- Android Unpack tool based on Cydia☆93Updated 7 years ago
- ☆156Updated 7 years ago