retme7 / launchAnyWhere_poc_by_retme_bug_7699048Links
source code & PoC file of launchAnyWhere problem
☆40Updated 11 years ago
Alternatives and similar repositories for launchAnyWhere_poc_by_retme_bug_7699048
Users that are interested in launchAnyWhere_poc_by_retme_bug_7699048 are comparing it to the libraries listed below
Sorting:
- Use black or white list to check if 3rd app have the permission to start the protected Activity☆14Updated 7 years ago
- A portable utility to locate android binder service☆96Updated 6 years ago
- blabla☆49Updated 4 years ago
- Various Jeb plugins, including obfuscation restore☆94Updated 9 years ago
- ART tracing research☆91Updated 2 years ago
- ☆62Updated 6 years ago
- walk into Android security step by step☆102Updated 7 years ago
- IDA plugin, unwind stack trace when debugging arm.☆138Updated 5 years ago
- OAT AXML ARSC Template for 010Editor☆77Updated 8 years ago
- ☆31Updated 9 years ago
- 参考支付宝代码☆45Updated 7 years ago
- A bunch of JEB python scripts☆44Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆24Updated 7 years ago
- PoC of CVE-2022-20474☆19Updated 8 months ago
- ☆88Updated 4 years ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Updated 10 years ago
- 修复AndroidManifest.xml☆32Updated 9 years ago
- inotifywait for Android☆104Updated 10 years ago
- ☆155Updated 7 years ago
- android so inject for arm64☆23Updated 10 years ago
- Android Library Code Recognition☆82Updated last year
- Android app for demonstrating native library harnessing☆41Updated 6 years ago
- Android Unpack tool based on Cydia☆93Updated 7 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 8 years ago
- This tool is used to extract dex files from oat file.☆167Updated 8 years ago
- ☆42Updated 6 years ago
- JNI Helper Plugin☆53Updated 10 months ago
- 安卓so内存加载劫持☆119Updated 8 years ago
- Hardware Assisted Unpacking of Android Apps☆56Updated 4 years ago
- Some frida scripts☆142Updated 7 years ago