samanL33T / jadx-xvision-pluginLinks
xVision is a plugin for the JadX decompiler that aims to integrate with Large Language Models (LLMs) to provide code analysis directly in the JAdX.
☆67Updated 7 months ago
Alternatives and similar repositories for jadx-xvision-plugin
Users that are interested in jadx-xvision-plugin are comparing it to the libraries listed below
Sorting:
- Anti Tamper & Anti Frida Bypass For Our Lovely LolGuard☆105Updated 3 years ago
- ☆59Updated 11 months ago
- ☆95Updated 3 years ago
- Getting better stacks and backtraces in Frida☆58Updated last month
- ☆59Updated 2 years ago
- This repo will contain the material for reversing flutter applications.☆52Updated 5 months ago
- Generate Frida hooks directly from JEB!☆90Updated 3 months ago
- Stealth patch for Frida, stealth knowledge collection☆114Updated last year
- Contains all the scripts and sample apps related to android in app protections.☆38Updated last month
- Small Apps As PoC to Detect Frida With Frida☆55Updated 3 years ago
- Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required☆61Updated 2 weeks ago
- Some Of Anti-Frida Stuff☆128Updated 3 years ago
- mobile reverse engineering framework☆57Updated this week
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Updated last month
- Generic Frida Script To Bypass Root Detection☆56Updated 3 years ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆161Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆92Updated last year
- Files used to resolve the r2pay challenge☆55Updated 5 years ago
- Jadx plugin that shows AI analysis of a method/class in a separate view.☆34Updated last year
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Updated 2 years ago
- Zygisk-based reFlutter☆134Updated 8 months ago
- Miscellaneous code☆109Updated 6 months ago
- Frida's setHardwareWatchpoint tutorial☆63Updated last year
- Extracting unpacked dec files from running application using frida.☆43Updated 2 years ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated last year
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated last week
- App for learnfrida.info☆21Updated 3 years ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆145Updated 3 weeks ago
- ☆30Updated 3 years ago