romangol / InDroid
Dalvik vm Instrumentation OS
☆86Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for InDroid
- IDA python script to dynamically dump DEX in memory☆141Updated 8 years ago
- Dalvik字节码自篡改原理及实现☆47Updated 7 years ago
- Android Unpack tool based on Cydia☆93Updated 6 years ago
- Various Jeb plugins, including obfuscation restore☆92Updated 8 years ago
- OAT AXML ARSC Template for 010Editor☆74Updated 7 years ago
- a lightweight debugger for android virtual machine.☆137Updated 8 years ago
- inotifywait for Android☆100Updated 9 years ago
- ApkSecurityAnalysis☆64Updated 5 years ago
- ARTDroid: Simple and easy to use library to intercept virtual-method calls under the Android ART runtime.☆79Updated 9 years ago
- ☆27Updated 8 years ago
- The slides and exploit of mosec2016☆112Updated 8 years ago
- PoC code for 32 bit Android OS☆131Updated 8 years ago
- AndroidSubstrate_hookingC_examples☆55Updated 9 years ago
- Xposed Module to automatically unpack Apk☆161Updated 7 years ago
- Extended oatdump from AOSP platform/art repo☆134Updated 7 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 8 years ago
- Archive from bluebox security open source: Dalvik bytecode tampering crackme☆84Updated 9 years ago
- a set of tools/scripts to obfuscate and manipulate dex files☆117Updated 9 years ago
- It's very similiar to Substrate. But I give you three methods to do HOOK.☆211Updated 9 years ago
- ☆23Updated 11 years ago
- ☆58Updated 7 years ago
- gdb plugin for android debugging☆103Updated 8 years ago
- I'll submit the poc after blackhat☆116Updated 9 years ago
- IDA debugging plugin for android armv7 so☆87Updated 6 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆122Updated 9 years ago
- CVE-2015-3636 exploit☆43Updated 9 years ago