romangol / InDroidLinks
Dalvik vm Instrumentation OS
☆87Updated 9 years ago
Alternatives and similar repositories for InDroid
Users that are interested in InDroid are comparing it to the libraries listed below
Sorting:
- Various Jeb plugins, including obfuscation restore☆93Updated 9 years ago
- Android Unpack tool based on Cydia☆93Updated 7 years ago
- IDA python script to dynamically dump DEX in memory☆144Updated 9 years ago
- Dalvik字节码自篡改原理及实现☆48Updated 8 years ago
- OAT AXML ARSC Template for 010Editor☆77Updated 8 years ago
- a lightweight debugger for android virtual machine.☆143Updated 8 years ago
- PoC code for 32 bit Android OS☆133Updated 9 years ago
- inotifywait for Android☆104Updated 9 years ago
- Extended oatdump from AOSP platform/art repo☆135Updated 7 years ago
- It's very similiar to Substrate. But I give you three methods to do HOOK.☆212Updated 9 years ago
- Xposed Module to automatically unpack Apk☆163Updated 8 years ago
- ☆27Updated 8 years ago
- An APK instrumentation library and DroidBox APIMonitor☆59Updated 12 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆119Updated 10 years ago
- restart adbd with root privileges☆165Updated 8 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆85Updated 9 years ago
- Parser and Modify AndroidManifest.xml to prevent APK from re-packege☆113Updated 10 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆78Updated 10 years ago
- This tool is used to extract dex files from oat file.☆167Updated 8 years ago
- ApkSecurityAnalysis☆65Updated 6 years ago
- AndroidSubstrate_hookingC_examples☆57Updated 10 years ago
- Android Malware Analysis Tutorial | Android恶意代码分析教程☆126Updated 13 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Updated 9 years ago
- A Tool to fuzz Intent on Android☆180Updated 7 years ago
- Local root exploit for Nexus5 Android 4.4.4(KTU84P)☆150Updated 10 years ago
- ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.☆111Updated 5 years ago
- Android Library Code Recognition☆82Updated last year
- The slides and exploit of mosec2016☆112Updated 9 years ago
- Example of obfuscating an Android NDK project using O-LLVM☆221Updated 11 years ago
- statically vetting android apps based soot☆19Updated 9 years ago